06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000000a84d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000edc00001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1489.337117][T22722] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000b000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1489.397891][T22725] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000006c000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1489.552997][T22738] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1489.599086][T22749] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 20:58:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01002000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000023000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1489.746965][T22742] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:58:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000001001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da42b3ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200002010000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200003f00000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1490.046124][T22765] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02004c0000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01102000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1490.214646][T22772] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:58:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000700000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000000ff4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000002301004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1490.388860][T22782] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000001001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1490.660162][T22796] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:48 executing program 0 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1490.723313][T22807] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:58:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da42d3ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1490.803645][T22809] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1490.830641][T22827] FAULT_INJECTION: forcing a failure. [ 1490.830641][T22827] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.843326][T22827] CPU: 1 PID: 22827 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #122 [ 1490.851370][T22827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1490.851375][T22827] Call Trace: [ 1490.851393][T22827] dump_stack+0x172/0x1f0 [ 1490.851412][T22827] should_fail.cold+0xa/0x15 [ 1490.851426][T22827] ? fault_create_debugfs_attr+0x180/0x180 [ 1490.851441][T22827] ? page_to_nid.part.0+0x20/0x20 [ 1490.864748][T22827] ? ___might_sleep+0x163/0x280 [ 1490.864765][T22827] __should_failslab+0x121/0x190 [ 1490.864779][T22827] should_failslab+0x9/0x14 [ 1490.864787][T22827] __kmalloc+0x2e0/0x770 [ 1490.864871][T22827] ? lock_sock_nested+0x9a/0x120 [ 1490.907835][T22827] ? sock_kmalloc+0xc6/0x120 [ 1490.912394][T22827] sock_kmalloc+0xc6/0x120 [ 1490.916789][T22827] af_alg_alloc_areq+0x24/0x1e0 [ 1490.921615][T22827] skcipher_recvmsg+0x7f8/0xdb0 [ 1490.926456][T22827] ? skcipher_bind+0x30/0x30 [ 1490.931024][T22827] ? selinux_socket_recvmsg+0x36/0x40 [ 1490.936361][T22827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1490.942569][T22827] ? security_socket_recvmsg+0x95/0xc0 [ 1490.947993][T22827] ? skcipher_bind+0x30/0x30 [ 1490.952598][T22827] sock_recvmsg+0xce/0x110 [ 1490.956988][T22827] ? sockfs_setattr+0x170/0x170 [ 1490.961815][T22827] ___sys_recvmsg+0x271/0x5a0 [ 1490.966464][T22827] ? ___sys_sendmsg+0x920/0x920 [ 1490.971283][T22827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1490.977493][T22827] ? __fget+0x384/0x560 [ 1490.981638][T22827] ? ksys_dup3+0x3e0/0x3e0 [ 1490.986025][T22827] ? _kstrtoul+0x170/0x170 [ 1490.990413][T22827] ? __fget_light+0x1a9/0x230 [ 1490.995066][T22827] ? __fdget+0x1b/0x20 [ 1490.999104][T22827] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1491.005312][T22827] do_recvmmsg+0x27e/0x7a0 [ 1491.009715][T22827] ? ___sys_recvmsg+0x5a0/0x5a0 [ 1491.014547][T22827] ? __kasan_check_read+0x11/0x20 [ 1491.019563][T22827] ? __kasan_check_write+0x14/0x20 [ 1491.024652][T22827] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1491.030180][T22827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1491.036481][T22827] __sys_recvmmsg+0x259/0x270 [ 1491.041125][T22827] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1491.046115][T22827] ? __ia32_sys_read+0xb0/0xb0 [ 1491.050845][T22827] ? switch_fpu_return+0x1fa/0x4f0 [ 1491.055928][T22827] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1491.061963][T22827] __x64_sys_recvmmsg+0xe6/0x140 [ 1491.066969][T22827] do_syscall_64+0xfd/0x6a0 [ 1491.071449][T22827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1491.077333][T22827] RIP: 0033:0x459879 [ 1491.081205][T22827] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1491.100775][T22827] RSP: 002b:00007f8617254c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1491.109170][T22827] RAX: ffffffffffffffda RBX: 00007f8617254c90 RCX: 0000000000459879 [ 1491.117125][T22827] RDX: 0000000000000001 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 1491.125064][T22827] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1491.133032][T22827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86172556d4 [ 1491.140981][T22827] R13: 00000000004c6dd5 R14: 00000000004dc220 R15: 0000000000000005 [ 1491.141105][ C1] net_ratelimit: 16 callbacks suppressed 20:58:49 executing program 0 (fault-call:5 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1491.141111][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1491.154630][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1491.242217][T22837] FAULT_INJECTION: forcing a failure. [ 1491.242217][T22837] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.255079][T22837] CPU: 0 PID: 22837 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #122 [ 1491.263133][T22837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1491.273184][T22837] Call Trace: [ 1491.276464][T22837] dump_stack+0x172/0x1f0 [ 1491.280773][T22837] should_fail.cold+0xa/0x15 [ 1491.285345][T22837] ? lock_downgrade+0x920/0x920 [ 1491.290163][T22837] ? fault_create_debugfs_attr+0x180/0x180 [ 1491.295935][T22837] ? page_to_nid.part.0+0x20/0x20 [ 1491.300927][T22837] ? ___might_sleep+0x163/0x280 [ 1491.305745][T22837] __should_failslab+0x121/0x190 [ 1491.310672][T22837] should_failslab+0x9/0x14 [ 1491.315142][T22837] __kmalloc+0x2e0/0x770 [ 1491.319367][T22837] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1491.325056][T22837] ? iov_iter_advance+0x295/0xf70 [ 1491.330053][T22837] ? sock_kmalloc+0xc6/0x120 [ 1491.334612][T22837] sock_kmalloc+0xc6/0x120 [ 1491.338996][T22837] af_alg_get_rsgl+0xd9/0x6b0 [ 1491.343647][T22837] skcipher_recvmsg+0x843/0xdb0 [ 1491.348468][T22837] ? skcipher_bind+0x30/0x30 [ 1491.353024][T22837] ? selinux_socket_recvmsg+0x36/0x40 [ 1491.356290][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1491.358368][T22837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1491.358382][T22837] ? security_socket_recvmsg+0x95/0xc0 [ 1491.364092][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1491.371059][T22837] ? skcipher_bind+0x30/0x30 [ 1491.371084][T22837] sock_recvmsg+0xce/0x110 [ 1491.371100][T22837] ? sockfs_setattr+0x170/0x170 [ 1491.395941][T22837] ___sys_recvmsg+0x271/0x5a0 [ 1491.400587][T22837] ? ___sys_sendmsg+0x920/0x920 [ 1491.405415][T22837] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1491.411621][T22837] ? __fget+0x384/0x560 [ 1491.415746][T22837] ? ksys_dup3+0x3e0/0x3e0 [ 1491.420143][T22837] ? _kstrtoul+0x170/0x170 [ 1491.424536][T22837] ? __fget_light+0x1a9/0x230 [ 1491.429178][T22837] ? __fdget+0x1b/0x20 [ 1491.433221][T22837] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1491.439445][T22837] do_recvmmsg+0x27e/0x7a0 [ 1491.443843][T22837] ? ___sys_recvmsg+0x5a0/0x5a0 [ 1491.448676][T22837] ? __kasan_check_read+0x11/0x20 [ 1491.453669][T22837] ? __kasan_check_write+0x14/0x20 [ 1491.458777][T22837] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1491.464294][T22837] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1491.470516][T22837] __sys_recvmmsg+0x259/0x270 [ 1491.475164][T22837] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1491.480165][T22837] ? __ia32_sys_read+0xb0/0xb0 [ 1491.484913][T22837] ? switch_fpu_return+0x1fa/0x4f0 [ 1491.490000][T22837] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1491.496034][T22837] __x64_sys_recvmmsg+0xe6/0x140 [ 1491.500941][T22837] do_syscall_64+0xfd/0x6a0 [ 1491.505423][T22837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1491.511289][T22837] RIP: 0033:0x459879 [ 1491.515150][T22837] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1491.534727][T22837] RSP: 002b:00007f8617254c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 20:58:49 executing program 0 (fault-call:5 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1491.543103][T22837] RAX: ffffffffffffffda RBX: 00007f8617254c90 RCX: 0000000000459879 [ 1491.551040][T22837] RDX: 0000000000000001 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 1491.558979][T22837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1491.566918][T22837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86172556d4 [ 1491.574856][T22837] R13: 00000000004c6dd5 R14: 00000000004dc220 R15: 0000000000000005 [ 1491.689814][T22843] FAULT_INJECTION: forcing a failure. [ 1491.689814][T22843] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.703894][T22843] CPU: 1 PID: 22843 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #122 [ 1491.711938][T22843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1491.721963][T22843] Call Trace: [ 1491.725231][T22843] dump_stack+0x172/0x1f0 [ 1491.729542][T22843] should_fail.cold+0xa/0x15 [ 1491.734100][T22843] ? fault_create_debugfs_attr+0x180/0x180 [ 1491.739886][T22843] ? page_to_nid.part.0+0x20/0x20 [ 1491.744894][T22843] ? ___might_sleep+0x163/0x280 [ 1491.749715][T22843] __should_failslab+0x121/0x190 [ 1491.754632][T22843] should_failslab+0x9/0x14 [ 1491.759120][T22843] __kmalloc+0x2e0/0x770 [ 1491.763347][T22843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1491.769565][T22843] ? af_alg_get_rsgl+0x4f8/0x6b0 [ 1491.774499][T22843] ? sock_kmalloc+0xc6/0x120 [ 1491.779097][T22843] sock_kmalloc+0xc6/0x120 [ 1491.783483][T22843] skcipher_recvmsg+0x267/0xdb0 [ 1491.788302][T22843] ? skcipher_bind+0x30/0x30 [ 1491.792865][T22843] ? selinux_socket_recvmsg+0x36/0x40 [ 1491.798211][T22843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1491.804429][T22843] ? security_socket_recvmsg+0x95/0xc0 [ 1491.809853][T22843] ? skcipher_bind+0x30/0x30 [ 1491.814414][T22843] sock_recvmsg+0xce/0x110 [ 1491.818802][T22843] ? sockfs_setattr+0x170/0x170 [ 1491.823644][T22843] ___sys_recvmsg+0x271/0x5a0 [ 1491.828291][T22843] ? ___sys_sendmsg+0x920/0x920 [ 1491.833111][T22843] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1491.839320][T22843] ? __fget+0x384/0x560 [ 1491.843442][T22843] ? ksys_dup3+0x3e0/0x3e0 [ 1491.847842][T22843] ? _kstrtoul+0x170/0x170 [ 1491.852238][T22843] ? __fget_light+0x1a9/0x230 [ 1491.856883][T22843] ? __fdget+0x1b/0x20 [ 1491.860921][T22843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1491.867232][T22843] do_recvmmsg+0x27e/0x7a0 [ 1491.871621][T22843] ? ___sys_recvmsg+0x5a0/0x5a0 [ 1491.876439][T22843] ? __kasan_check_read+0x11/0x20 [ 1491.881464][T22843] ? __kasan_check_write+0x14/0x20 [ 1491.886549][T22843] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1491.892096][T22843] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1491.898313][T22843] __sys_recvmmsg+0x259/0x270 [ 1491.902967][T22843] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1491.907958][T22843] ? __ia32_sys_read+0xb0/0xb0 [ 1491.912706][T22843] ? switch_fpu_return+0x1fa/0x4f0 [ 1491.917791][T22843] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1491.923831][T22843] __x64_sys_recvmmsg+0xe6/0x140 [ 1491.928749][T22843] do_syscall_64+0xfd/0x6a0 [ 1491.933229][T22843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1491.939104][T22843] RIP: 0033:0x459879 [ 1491.942967][T22843] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1491.962539][T22843] RSP: 002b:00007f8617254c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1491.970924][T22843] RAX: ffffffffffffffda RBX: 00007f8617254c90 RCX: 0000000000459879 [ 1491.978875][T22843] RDX: 0000000000000001 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 1491.986825][T22843] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1491.994782][T22843] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86172556d4 [ 1492.002724][T22843] R13: 00000000004c6dd5 R14: 00000000004dc220 R15: 0000000000000005 [ 1492.016353][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1492.022127][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1492.027927][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1492.033689][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1492.039490][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1492.045229][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:58:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000020000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:50 executing program 0 (fault-call:5 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01003f00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000004801004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1492.134573][T22947] FAULT_INJECTION: forcing a failure. [ 1492.134573][T22947] name failslab, interval 1, probability 0, space 0, times 0 [ 1492.147572][T22947] CPU: 1 PID: 22947 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #122 [ 1492.155614][T22947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.165645][T22947] Call Trace: [ 1492.168913][T22947] dump_stack+0x172/0x1f0 [ 1492.173215][T22947] should_fail.cold+0xa/0x15 [ 1492.177773][T22947] ? fault_create_debugfs_attr+0x180/0x180 [ 1492.183551][T22947] ? page_to_nid.part.0+0x20/0x20 [ 1492.188638][T22947] ? ___might_sleep+0x163/0x280 [ 1492.193459][T22947] __should_failslab+0x121/0x190 [ 1492.198376][T22947] should_failslab+0x9/0x14 [ 1492.202845][T22947] __kmalloc+0x2e0/0x770 [ 1492.207055][T22947] ? stack_trace_consume_entry+0x190/0x190 [ 1492.212827][T22947] ? skcipher_recvmsg+0x843/0xdb0 [ 1492.217817][T22947] ? skcipher_walk_next+0x753/0x16b0 [ 1492.223090][T22947] skcipher_walk_next+0x753/0x16b0 [ 1492.228202][T22947] skcipher_walk_first+0xfb/0x3a0 [ 1492.233195][T22947] ? ___might_sleep+0x163/0x280 [ 1492.238022][T22947] skcipher_walk_skcipher+0x546/0x700 [ 1492.243359][T22947] skcipher_walk_virt+0xa6/0x150 [ 1492.248267][T22947] crypto_cbc_decrypt+0xc2/0x430 [ 1492.253172][T22947] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1492.258776][T22947] ? __kasan_check_read+0x11/0x20 [ 1492.263780][T22947] ? should_fail+0x1de/0x852 [ 1492.268337][T22947] ? crypto_cbc_create+0x220/0x220 [ 1492.273422][T22947] ? fault_create_debugfs_attr+0x180/0x180 [ 1492.279213][T22947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1492.285421][T22947] ? af_alg_pull_tsgl+0x54e/0x940 [ 1492.290425][T22947] crypto_skcipher_decrypt+0x8e/0xd0 [ 1492.295684][T22947] skcipher_recvmsg+0xae1/0xdb0 [ 1492.300512][T22947] ? skcipher_bind+0x30/0x30 [ 1492.305070][T22947] ? selinux_socket_recvmsg+0x36/0x40 [ 1492.310414][T22947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1492.316620][T22947] ? security_socket_recvmsg+0x95/0xc0 [ 1492.322066][T22947] ? skcipher_bind+0x30/0x30 [ 1492.326651][T22947] sock_recvmsg+0xce/0x110 [ 1492.331036][T22947] ? sockfs_setattr+0x170/0x170 [ 1492.335870][T22947] ___sys_recvmsg+0x271/0x5a0 [ 1492.340526][T22947] ? ___sys_sendmsg+0x920/0x920 [ 1492.345343][T22947] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1492.351564][T22947] ? __fget+0x384/0x560 [ 1492.355688][T22947] ? ksys_dup3+0x3e0/0x3e0 [ 1492.360080][T22947] ? _kstrtoul+0x170/0x170 [ 1492.364463][T22947] ? __fget_light+0x1a9/0x230 [ 1492.369105][T22947] ? __fdget+0x1b/0x20 [ 1492.373149][T22947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1492.379468][T22947] do_recvmmsg+0x27e/0x7a0 [ 1492.383865][T22947] ? ___sys_recvmsg+0x5a0/0x5a0 [ 1492.388683][T22947] ? __kasan_check_read+0x11/0x20 [ 1492.393676][T22947] ? __kasan_check_write+0x14/0x20 [ 1492.398755][T22947] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1492.404272][T22947] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1492.410729][T22947] __sys_recvmmsg+0x259/0x270 [ 1492.415375][T22947] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1492.420376][T22947] ? __ia32_sys_read+0xb0/0xb0 [ 1492.425109][T22947] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1492.431145][T22947] __x64_sys_recvmmsg+0xe6/0x140 [ 1492.436052][T22947] do_syscall_64+0xfd/0x6a0 [ 1492.440524][T22947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1492.446387][T22947] RIP: 0033:0x459879 [ 1492.450259][T22947] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1492.469829][T22947] RSP: 002b:00007f8617254c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1492.478204][T22947] RAX: ffffffffffffffda RBX: 00007f8617254c90 RCX: 0000000000459879 20:58:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4303ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000800004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:50 executing program 0 (fault-call:5 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1492.486143][T22947] RDX: 0000000000000001 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 1492.494079][T22947] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1492.502035][T22947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86172556d4 [ 1492.509988][T22947] R13: 00000000004c6dd5 R14: 00000000004dc220 R15: 0000000000000005 [ 1492.669351][T22956] FAULT_INJECTION: forcing a failure. [ 1492.669351][T22956] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1492.701851][T22956] CPU: 1 PID: 22956 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #122 20:58:50 executing program 0 (fault-call:5 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1492.710009][T22956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.720102][T22956] Call Trace: [ 1492.720121][T22956] dump_stack+0x172/0x1f0 [ 1492.720140][T22956] should_fail.cold+0xa/0x15 [ 1492.720155][T22956] ? fault_create_debugfs_attr+0x180/0x180 [ 1492.720170][T22956] ? ___might_sleep+0x163/0x280 [ 1492.720188][T22956] should_fail_alloc_page+0x50/0x60 [ 1492.720198][T22956] __alloc_pages_nodemask+0x1a1/0x900 [ 1492.720212][T22956] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1492.720225][T22956] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1492.720241][T22956] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1492.720257][T22956] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1492.720271][T22956] alloc_pages_current+0x107/0x210 [ 1492.720283][T22956] __get_free_pages+0xc/0x40 [ 1492.720295][T22956] skcipher_walk_next+0xa4d/0x16b0 [ 1492.720305][T22956] ? scatterwalk_copychunks+0x57a/0x6a0 [ 1492.720321][T22956] skcipher_walk_done+0x409/0xd50 [ 1492.720338][T22956] crypto_cbc_decrypt+0x259/0x430 [ 1492.720354][T22956] ? crypto_cbc_create+0x220/0x220 [ 1492.720366][T22956] ? fault_create_debugfs_attr+0x180/0x180 [ 1492.720385][T22956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1492.720397][T22956] ? af_alg_pull_tsgl+0x54e/0x940 [ 1492.720415][T22956] crypto_skcipher_decrypt+0x8e/0xd0 [ 1492.720427][T22956] skcipher_recvmsg+0xae1/0xdb0 [ 1492.720444][T22956] ? skcipher_bind+0x30/0x30 [ 1492.720456][T22956] ? selinux_socket_recvmsg+0x36/0x40 [ 1492.720466][T22956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1492.720480][T22956] ? security_socket_recvmsg+0x95/0xc0 [ 1492.728050][T22956] ? skcipher_bind+0x30/0x30 [ 1492.728065][T22956] sock_recvmsg+0xce/0x110 [ 1492.728076][T22956] ? sockfs_setattr+0x170/0x170 [ 1492.728088][T22956] ___sys_recvmsg+0x271/0x5a0 [ 1492.728104][T22956] ? ___sys_sendmsg+0x920/0x920 [ 1492.728118][T22956] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1492.728133][T22956] ? __fget+0x384/0x560 [ 1492.728146][T22956] ? ksys_dup3+0x3e0/0x3e0 [ 1492.728159][T22956] ? _kstrtoul+0x170/0x170 [ 1492.728172][T22956] ? __fget_light+0x1a9/0x230 [ 1492.728183][T22956] ? __fdget+0x1b/0x20 [ 1492.728195][T22956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1492.728208][T22956] do_recvmmsg+0x27e/0x7a0 [ 1492.728223][T22956] ? ___sys_recvmsg+0x5a0/0x5a0 [ 1492.728233][T22956] ? __kasan_check_read+0x11/0x20 [ 1492.728248][T22956] ? __kasan_check_write+0x14/0x20 [ 1492.728259][T22956] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1492.728277][T22956] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1492.728292][T22956] __sys_recvmmsg+0x259/0x270 [ 1492.728305][T22956] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1492.728315][T22956] ? __ia32_sys_read+0xb0/0xb0 [ 1492.728327][T22956] ? switch_fpu_return+0x1fa/0x4f0 [ 1492.728339][T22956] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1492.728353][T22956] __x64_sys_recvmmsg+0xe6/0x140 [ 1492.728368][T22956] do_syscall_64+0xfd/0x6a0 [ 1492.728381][T22956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1492.728390][T22956] RIP: 0033:0x459879 [ 1492.728401][T22956] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1492.728407][T22956] RSP: 002b:00007f8617254c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1492.728418][T22956] RAX: ffffffffffffffda RBX: 00007f8617254c90 RCX: 0000000000459879 [ 1492.728425][T22956] RDX: 0000000000000001 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 1492.728431][T22956] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1492.728437][T22956] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86172556d4 [ 1492.728443][T22956] R13: 00000000004c6dd5 R14: 00000000004dc220 R15: 0000000000000005 20:58:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x2, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1493.191885][T22960] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1493.234819][T22963] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 20:58:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x3, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1493.285648][T22953] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1493.317546][T22965] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x7, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200001020000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000004c01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x10, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01004000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4373ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000a800004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1493.959946][T23410] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:58:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x300, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1494.015757][T23517] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1494.056130][T23518] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x700, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1494.098849][T23520] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01004800000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x4000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x100000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x8000a0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1494.439717][T23520] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1494.741883][T23741] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1494.800839][T23521] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 20:58:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000003f000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000006801004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x1000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000201004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43d3ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x2000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1494.949885][T24067] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01004c00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x3000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1495.067699][T24066] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:58:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x7000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1495.130988][T24071] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:58:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000301004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1495.224659][T24214] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 [ 1495.250175][T24067] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x10000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x40000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1495.383513][T24287] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1495.656606][T24446] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:58:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000040000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da45c3ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x8dffffff, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01006800000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000006c01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1495.976121][T24446] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:58:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0xa0008000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000401004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1496.142027][T24726] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1496.156316][ C0] net_ratelimit: 14 callbacks suppressed [ 1496.156322][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1496.167721][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1496.173502][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1496.179278][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1496.185043][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1496.190886][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:58:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0xf0ffffff, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000007401004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1496.265885][T24728] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0xffffff8d, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1496.360485][T24732] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0xfffffff0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01006c00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1496.633019][T24951] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1496.786767][T24728] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1496.881180][T25065] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:58:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000048000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x10000000000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4633ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x8000a0ffffffff, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1497.076805][T25249] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000007a01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1497.156306][T24951] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:58:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x100000000000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x200000000000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1497.308589][T25294] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1497.366282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1497.372139][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:58:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01007400000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1497.437856][T25403] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 [ 1497.471854][T25512] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:58:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x300000000000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1497.596282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1497.602060][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:58:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000003004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1497.711934][T25621] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:58:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x700000000000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1497.758657][T25403] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 20:58:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000004c000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x1000000000000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1497.862846][T25735] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1497.898201][T25294] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da47e3ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x4000000000000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01007a00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x8dffffff00000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1498.266591][T25849] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:58:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000601004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0xf0ffffff00000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000005004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1498.467373][T26183] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0xffffffff00000000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1498.525882][T26190] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01c0ed00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0xffffffffa0008000, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000064000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1498.784281][T26302] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1498.976214][T26309] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:58:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4360ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1499.043534][T26531] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100ff00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000701004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000006004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000068000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1499.363065][T26868] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1499.624645][T26982] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1499.728709][T27093] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1499.903805][T27208] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:58:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da43625c0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000004000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000801004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000006c000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000007004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1500.361047][T27759] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1500.424469][T27760] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 20:58:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1500.495879][T27828] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:58:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1500.578714][T27872] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1500.796771][T27752] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1500.818987][T27760] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 20:58:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363dc0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000074000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:58:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01a00080000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000901004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000009004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000007a000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1501.362114][T28425] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1501.516287][ C1] net_ratelimit: 16 callbacks suppressed [ 1501.516293][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1501.527743][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1501.539598][T28429] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:58:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1501.677366][T28528] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:58:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000a01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1501.756292][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1501.762109][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1501.832240][T28441] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1501.902181][T28425] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:58:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4367ec0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:58:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000010000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:58:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1502.088932][T28868] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000a004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000b01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1502.313608][T28878] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1502.396287][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1502.402079][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1502.407866][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1502.413609][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1502.413671][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1502.425053][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1502.479418][T28981] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000c0ed000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000020000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1502.597059][T29206] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1502.730269][T29208] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1502.767165][T28981] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0300000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1503.048211][T29217] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000030000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000b004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000001001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1503.336545][T29648] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000ff000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1503.636174][T29862] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1503.714276][T29870] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x10}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1503.859913][T29872] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1503.942175][T29648] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0400000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x20001186}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x7ffff000}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000002301004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000040000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000014004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0xffffffffffffffff}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000a000800001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x10}], 0x2}}], 0x1, 0x0, 0x0) [ 1504.612553][T30381] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x14a}], 0x2}}], 0x1, 0x0, 0x0) [ 1504.673614][T30527] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1504.703373][T30531] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x600}], 0x2}}], 0x1, 0x0, 0x0) [ 1504.821092][T30638] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0500000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000025004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000004801004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1505.243625][T31075] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000050000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x604}], 0x2}}], 0x1, 0x0, 0x0) 20:59:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000101004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x605}], 0x2}}], 0x1, 0x0, 0x0) 20:59:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000003c004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1505.575858][T31186] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x606}], 0x2}}], 0x1, 0x0, 0x0) [ 1505.647414][T31195] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x607}], 0x2}}], 0x1, 0x0, 0x0) [ 1505.808596][T31303] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0600000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x608}], 0x2}}], 0x1, 0x0, 0x0) [ 1505.947698][T31518] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 20:59:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x609}], 0x2}}], 0x1, 0x0, 0x0) [ 1506.017338][T31521] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000004c01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x60a}], 0x2}}], 0x1, 0x0, 0x0) 20:59:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000060000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x60b}], 0x2}}], 0x1, 0x0, 0x0) 20:59:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000201004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000003f004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1506.356694][T31843] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x60c}], 0x2}}], 0x1, 0x0, 0x0) [ 1506.556298][ C0] net_ratelimit: 14 callbacks suppressed [ 1506.556304][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1506.567832][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1506.573613][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1506.579366][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1506.584356][T32175] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1506.585130][ C0] protocol 88fb is buggy, dev hsr_slave_0 20:59:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x60d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0700000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1506.602033][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1506.621850][T32176] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 20:59:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x60e}], 0x2}}], 0x1, 0x0, 0x0) [ 1506.686465][T32072] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x700}], 0x2}}], 0x1, 0x0, 0x0) [ 1506.856744][T32181] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000070000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1507.073623][T32323] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1507.103819][T32176] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 [ 1507.141129][T32601] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1507.236880][T32175] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000006001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xec0}], 0x2}}], 0x1, 0x0, 0x0) 20:59:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000040004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000301004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xed0}], 0x2}}], 0x1, 0x0, 0x0) 20:59:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0800000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1507.569044][T32628] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000080000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xffa}], 0x2}}], 0x1, 0x0, 0x0) 20:59:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000368004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1507.738264][T32734] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1507.756297][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1507.762084][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1001}], 0x2}}], 0x1, 0x0, 0x0) [ 1507.946887][ T468] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1002}], 0x2}}], 0x1, 0x0, 0x0) [ 1507.996304][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1508.002104][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1003}], 0x2}}], 0x1, 0x0, 0x0) [ 1508.042652][ T486] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1508.193482][ T488] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1508.266836][T32734] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000006801004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000910a00301004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1007}], 0x2}}], 0x1, 0x0, 0x0) 20:59:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000090000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1010}], 0x2}}], 0x1, 0x0, 0x0) 20:59:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0900000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000373004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1600}], 0x2}}], 0x1, 0x0, 0x0) [ 1508.678066][ T1101] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1601}], 0x2}}], 0x1, 0x0, 0x0) [ 1508.827171][ T924] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000a0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1509.017359][ T1247] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000006c01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1604}], 0x2}}], 0x1, 0x0, 0x0) 20:59:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000401004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1605}], 0x2}}], 0x1, 0x0, 0x0) [ 1509.162807][ T1257] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0a00000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1606}], 0x2}}], 0x1, 0x0, 0x0) [ 1509.377120][ T1693] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000007e004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1509.419298][ T1816] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1509.450656][ T1819] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1607}], 0x2}}], 0x1, 0x0, 0x0) [ 1509.568211][ T1826] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000501004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000b0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1609}], 0x2}}], 0x1, 0x0, 0x0) [ 1509.866114][ T1976] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000007401004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed1000000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x160a}], 0x2}}], 0x1, 0x0, 0x0) [ 1510.172255][ T2265] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000ff004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x160b}], 0x2}}], 0x1, 0x0, 0x0) [ 1510.241017][ T2267] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1510.296577][ T2379] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x160c}], 0x2}}], 0x1, 0x0, 0x0) [ 1510.354923][ T2383] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x160d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x160e}], 0x2}}], 0x1, 0x0, 0x0) 20:59:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000100000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000601004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1510.752147][ T2489] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1511.071900][ T2831] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000007a01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed1400000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2001}], 0x2}}], 0x1, 0x0, 0x0) 20:59:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2600}], 0x2}}], 0x1, 0x0, 0x0) 20:59:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000200000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1511.237553][ T2941] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000701004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000003004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1511.411304][ T3058] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2601}], 0x2}}], 0x1, 0x0, 0x0) [ 1511.547638][ T3190] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2602}], 0x2}}], 0x1, 0x0, 0x0) [ 1511.744652][ T3220] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2603}], 0x2}}], 0x1, 0x0, 0x0) [ 1511.787037][ T3336] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1511.802439][ T3058] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1511.916291][ C1] net_ratelimit: 16 callbacks suppressed [ 1511.916297][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1511.927774][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2604}], 0x2}}], 0x1, 0x0, 0x0) 20:59:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed3d00000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1512.016533][ T3343] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1512.075127][ T3190] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1512.156291][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1512.162177][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000003004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2605}], 0x2}}], 0x1, 0x0, 0x0) 20:59:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2606}], 0x2}}], 0x1, 0x0, 0x0) 20:59:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000010200000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2607}], 0x2}}], 0x1, 0x0, 0x0) 20:59:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000801004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000004004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2608}], 0x2}}], 0x1, 0x0, 0x0) [ 1512.650495][ T3679] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x2609}], 0x2}}], 0x1, 0x0, 0x0) [ 1512.759398][ T3896] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1512.796310][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1512.802095][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1512.807981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1512.813709][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1512.813777][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1512.825175][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x260a}], 0x2}}], 0x1, 0x0, 0x0) [ 1512.919071][ T4019] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x260b}], 0x2}}], 0x1, 0x0, 0x0) [ 1513.091602][ T4210] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed7e00000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000005004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000003f0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x260c}], 0x2}}], 0x1, 0x0, 0x0) 20:59:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x260d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000005004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000901004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x260e}], 0x2}}], 0x1, 0x0, 0x0) [ 1513.439414][ T4555] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1513.579309][ T4659] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000400000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1513.624587][ T4665] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3000}], 0x2}}], 0x1, 0x0, 0x0) [ 1513.673434][ T4771] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3001}], 0x2}}], 0x1, 0x0, 0x0) [ 1513.792576][ T4774] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 20:59:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3600}], 0x2}}], 0x1, 0x0, 0x0) [ 1514.061096][ T4886] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1514.218163][ T4659] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000001000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1514.337887][ T4665] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000006004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000006004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000003a0100901004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000480000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1514.546688][ T5216] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3603}], 0x2}}], 0x1, 0x0, 0x0) [ 1514.839406][ T5237] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1514.919432][ T5230] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1514.945367][ T5338] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3604}], 0x2}}], 0x1, 0x0, 0x0) [ 1514.979551][ T5216] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3605}], 0x2}}], 0x1, 0x0, 0x0) 20:59:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000002000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3606}], 0x2}}], 0x1, 0x0, 0x0) 20:59:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000a01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1515.566504][ T5772] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000007004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000004c0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000007004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3607}], 0x2}}], 0x1, 0x0, 0x0) 20:59:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3608}], 0x2}}], 0x1, 0x0, 0x0) [ 1515.768899][ T5898] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000003000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x3609}], 0x2}}], 0x1, 0x0, 0x0) 20:59:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x360a}], 0x2}}], 0x1, 0x0, 0x0) [ 1515.957210][ T5901] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000009004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x360b}], 0x2}}], 0x1, 0x0, 0x0) [ 1516.048628][ T5904] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000680000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000b01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1516.213924][ T6241] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1516.301737][ T6294] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1516.447422][ T6359] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000009004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x360c}], 0x2}}], 0x1, 0x0, 0x0) 20:59:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000a004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x360d}], 0x2}}], 0x1, 0x0, 0x0) [ 1516.591966][ T6478] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 20:59:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x360e}], 0x2}}], 0x1, 0x0, 0x0) 20:59:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0202000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000006c0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1516.765476][ T6488] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4001}], 0x2}}], 0x1, 0x0, 0x0) [ 1516.956312][ C0] net_ratelimit: 14 callbacks suppressed [ 1516.956319][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1516.967747][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1516.973528][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1516.979275][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1516.985142][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1516.990904][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1517.065666][ T6703] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000b004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1517.105503][ T6478] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 20:59:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4600}], 0x2}}], 0x1, 0x0, 0x0) 20:59:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000001001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1517.203088][ T6814] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1517.382303][ T6821] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1517.697052][ T7033] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000a004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000740000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000002001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0203000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000010004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1518.064128][ T7159] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1518.156280][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1518.162154][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4604}], 0x2}}], 0x1, 0x0, 0x0) [ 1518.219014][ T7270] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000007a0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4605}], 0x2}}], 0x1, 0x0, 0x0) [ 1518.361845][ T7376] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1518.396302][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1518.402075][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4606}], 0x2}}], 0x1, 0x0, 0x0) [ 1518.410499][ T7394] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 [ 1518.532749][ T7383] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1518.677574][ T7499] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1518.733297][ T7270] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000b004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4607}], 0x2}}], 0x1, 0x0, 0x0) 20:59:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000014004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000102001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4608}], 0x2}}], 0x1, 0x0, 0x0) [ 1518.999303][ T7821] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0204000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x4609}], 0x2}}], 0x1, 0x0, 0x0) 20:59:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01ffffff8c0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000025004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1519.173616][ T7977] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1519.232089][ T8040] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 20:59:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x460a}], 0x2}}], 0x1, 0x0, 0x0) [ 1519.316589][ T8041] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x460b}], 0x2}}], 0x1, 0x0, 0x0) 20:59:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x460c}], 0x2}}], 0x1, 0x0, 0x0) [ 1519.529979][ T8079] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1519.707204][ T8157] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000014004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x460d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01008000a00000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000003c004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000003f01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1520.139120][ T8041] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0205000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x460e}], 0x2}}], 0x1, 0x0, 0x0) [ 1520.338388][ T8486] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000edc00000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5600}], 0x2}}], 0x1, 0x0, 0x0) [ 1520.543533][ T8488] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1520.569419][ T8705] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0206000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1520.647316][ T8703] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1520.736414][ T8569] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 [ 1520.909456][ T8823] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1521.056951][ T8932] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1521.080647][ T8703] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000025004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000004001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000007e004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01fffffff60000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5604}], 0x2}}], 0x1, 0x0, 0x0) [ 1521.356775][ T9053] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5605}], 0x2}}], 0x1, 0x0, 0x0) 20:59:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5606}], 0x2}}], 0x1, 0x0, 0x0) 20:59:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000068034d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1521.532885][ T9052] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5607}], 0x2}}], 0x1, 0x0, 0x0) [ 1521.594247][ T8932] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0207000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1521.719054][ T9166] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000003d004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000004801004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01fffffdf90000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1521.981004][ T9499] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1522.009875][ T9695] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x5609}], 0x2}}], 0x1, 0x0, 0x0) 20:59:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000073034d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1522.136508][ T9708] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 [ 1522.239726][ T9786] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x560a}], 0x2}}], 0x1, 0x0, 0x0) 20:59:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000004c01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1522.316299][ C1] net_ratelimit: 16 callbacks suppressed [ 1522.316304][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1522.327715][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1522.348885][ T9792] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x560b}], 0x2}}], 0x1, 0x0, 0x0) 20:59:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0208000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x560c}], 0x2}}], 0x1, 0x0, 0x0) [ 1522.553435][ T9941] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1522.564708][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1522.564747][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000ff0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000003f004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x560d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x560e}], 0x2}}], 0x1, 0x0, 0x0) 20:59:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000000744d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1522.891722][T10190] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6000}], 0x2}}], 0x1, 0x0, 0x0) [ 1523.011795][T10298] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000006401004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6600}], 0x2}}], 0x1, 0x0, 0x0) [ 1523.103728][T10407] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1523.117945][ T9977] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 [ 1523.187439][T10190] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1523.198868][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1523.198919][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1523.198989][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1523.199022][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1523.199094][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1523.199128][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0209000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1523.429853][T10493] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01f9fdffff0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000040004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000000ff4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6604}], 0x2}}], 0x1, 0x0, 0x0) [ 1523.819268][T10843] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6605}], 0x2}}], 0x1, 0x0, 0x0) [ 1523.965676][T11058] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000006801004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6606}], 0x2}}], 0x1, 0x0, 0x0) 20:59:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001024d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1524.137808][T11071] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6607}], 0x2}}], 0x1, 0x0, 0x0) [ 1524.198283][T11066] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020a000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d018cffffff0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x6609}], 0x2}}], 0x1, 0x0, 0x0) [ 1524.536917][T11397] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000063004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x660a}], 0x2}}], 0x1, 0x0, 0x0) 20:59:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x660b}], 0x2}}], 0x1, 0x0, 0x0) [ 1524.739483][T11609] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001034d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1524.904551][T11606] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x660c}], 0x2}}], 0x1, 0x0, 0x0) 20:59:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000006c01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x660d}], 0x2}}], 0x1, 0x0, 0x0) [ 1525.047559][T11929] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01f6ffffff0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1525.119066][T11609] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020b000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x660e}], 0x2}}], 0x1, 0x0, 0x0) [ 1525.234314][T11934] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7600}], 0x2}}], 0x1, 0x0, 0x0) [ 1525.556760][T12154] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1525.736869][T12262] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1525.817205][T11929] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000368004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001044d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100000000c0ed000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000007401004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0210000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1526.150313][T12489] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1526.206603][T12490] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7603}], 0x2}}], 0x1, 0x0, 0x0) [ 1526.282852][T12700] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 20:59:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7604}], 0x2}}], 0x1, 0x0, 0x0) 20:59:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7605}], 0x2}}], 0x1, 0x0, 0x0) 20:59:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000040000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1526.443288][T12740] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7606}], 0x2}}], 0x1, 0x0, 0x0) [ 1526.593798][T12804] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1526.822709][T13064] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1526.998798][T12804] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1527.169891][T12740] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000373004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001054d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000007a01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7607}], 0x2}}], 0x1, 0x0, 0x0) 20:59:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01ffffffffa000800000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0223000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1527.356295][ C0] net_ratelimit: 14 callbacks suppressed [ 1527.356302][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1527.367718][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1527.373495][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1527.379271][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1527.385068][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1527.390824][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7609}], 0x2}}], 0x1, 0x0, 0x0) [ 1527.558981][T13255] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1527.595730][T13261] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x760a}], 0x2}}], 0x1, 0x0, 0x0) [ 1527.648692][T13259] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x760b}], 0x2}}], 0x1, 0x0, 0x0) 20:59:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x760c}], 0x2}}], 0x1, 0x0, 0x0) [ 1527.792227][T13366] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x760d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000007e004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1528.034358][T13259] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001064d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000ffffff8c01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x760e}], 0x2}}], 0x1, 0x0, 0x0) 20:59:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000100000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1528.194620][T14009] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0248000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8600}], 0x2}}], 0x1, 0x0, 0x0) 20:59:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000ff004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1528.441846][T14109] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8601}], 0x2}}], 0x1, 0x0, 0x0) [ 1528.523872][T14063] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1528.556288][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1528.562192][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000200000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1528.718111][T14131] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1528.748970][T14015] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 20:59:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8604}], 0x2}}], 0x1, 0x0, 0x0) [ 1528.796299][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1528.802050][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001074d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000008000a001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8605}], 0x2}}], 0x1, 0x0, 0x0) [ 1528.882280][T14245] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8606}], 0x2}}], 0x1, 0x0, 0x0) [ 1529.103422][T14564] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1529.449430][T14678] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1529.527924][T14245] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed024c000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8607}], 0x2}}], 0x1, 0x0, 0x0) 20:59:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000300000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000edc001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x8609}], 0x2}}], 0x1, 0x0, 0x0) 20:59:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001084d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1530.010975][T14900] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x860a}], 0x2}}], 0x1, 0x0, 0x0) 20:59:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000400000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1530.167166][T15011] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1530.200442][T15013] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x860b}], 0x2}}], 0x1, 0x0, 0x0) [ 1530.213807][T15120] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 [ 1530.228192][T15131] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001094d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1530.540884][T15337] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1530.610055][T15450] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0268000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x860c}], 0x2}}], 0x1, 0x0, 0x0) 20:59:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000fffffff601004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000003004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000010a4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000500000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x860d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x860e}], 0x2}}], 0x1, 0x0, 0x0) [ 1531.126949][T15580] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1531.155898][T15577] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9600}], 0x2}}], 0x1, 0x0, 0x0) [ 1531.209661][T15573] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1531.223956][T15578] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed026c000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000fffffdf901004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000600000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9602}], 0x2}}], 0x1, 0x0, 0x0) [ 1531.543655][T15948] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000004004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000010b4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9604}], 0x2}}], 0x1, 0x0, 0x0) [ 1531.853320][T16092] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9605}], 0x2}}], 0x1, 0x0, 0x0) [ 1532.013868][T15948] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0274000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9606}], 0x2}}], 0x1, 0x0, 0x0) [ 1532.163218][T16247] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000ff01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9607}], 0x2}}], 0x1, 0x0, 0x0) 20:59:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001104d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1532.325431][T16254] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000700000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000005004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1532.527855][T16579] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x9609}], 0x2}}], 0x1, 0x0, 0x0) [ 1532.716300][ C1] net_ratelimit: 16 callbacks suppressed [ 1532.716311][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1532.727815][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x960a}], 0x2}}], 0x1, 0x0, 0x0) [ 1532.794352][T16695] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x960b}], 0x2}}], 0x1, 0x0, 0x0) 20:59:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001234d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1532.956303][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1532.962114][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1532.962455][T16837] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1533.128707][T16915] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed027a000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x960c}], 0x2}}], 0x1, 0x0, 0x0) 20:59:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000f9fdffff01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000800000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1533.254278][T17242] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x960d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000006004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x960e}], 0x2}}], 0x1, 0x0, 0x0) 20:59:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001484d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1533.568860][T17362] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1533.606307][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1533.612066][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa000}], 0x2}}], 0x1, 0x0, 0x0) [ 1533.617880][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1533.623636][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1533.629448][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1533.635181][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa600}], 0x2}}], 0x1, 0x0, 0x0) [ 1533.720187][T17363] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa602}], 0x2}}], 0x1, 0x0, 0x0) [ 1533.771484][T17477] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1533.788653][T17482] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200030004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200008cffffff01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000900000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000014c4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1534.258365][T17477] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000007004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa604}], 0x2}}], 0x1, 0x0, 0x0) 20:59:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa605}], 0x2}}], 0x1, 0x0, 0x0) [ 1534.477785][T18137] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa606}], 0x2}}], 0x1, 0x0, 0x0) [ 1534.627663][T18141] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa607}], 0x2}}], 0x1, 0x0, 0x0) 20:59:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001684d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa608}], 0x2}}], 0x1, 0x0, 0x0) [ 1534.888189][T18150] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1535.019402][T18260] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200050004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000f6ffffff01004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa609}], 0x2}}], 0x1, 0x0, 0x0) 20:59:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000a00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1535.092674][T18585] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa60a}], 0x2}}], 0x1, 0x0, 0x0) 20:59:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000009004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1535.290879][T18734] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000016c4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa60b}], 0x2}}], 0x1, 0x0, 0x0) [ 1535.466848][T18807] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000b00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000002000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa60c}], 0x2}}], 0x1, 0x0, 0x0) [ 1535.629562][T18938] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa60d}], 0x2}}], 0x1, 0x0, 0x0) [ 1535.749764][T18937] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1535.829173][T18807] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200060004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xa60e}], 0x2}}], 0x1, 0x0, 0x0) 20:59:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb000}], 0x2}}], 0x1, 0x0, 0x0) [ 1536.040177][T19059] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb600}], 0x2}}], 0x1, 0x0, 0x0) [ 1536.151634][T19065] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1536.175847][T18938] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000003000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000a004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001744d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1536.506107][T19390] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000001000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb604}], 0x2}}], 0x1, 0x0, 0x0) [ 1536.848463][T19614] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1536.912326][T19724] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1536.925141][T19390] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200070004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb605}], 0x2}}], 0x1, 0x0, 0x0) 20:59:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1537.110266][T19833] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb606}], 0x2}}], 0x1, 0x0, 0x0) 20:59:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000b004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000017a4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb607}], 0x2}}], 0x1, 0x0, 0x0) [ 1537.378203][T20159] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1537.413743][T20162] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 20:59:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000002000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1537.459921][T20379] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000005000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb609}], 0x2}}], 0x1, 0x0, 0x0) [ 1537.743625][T20411] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1537.756291][ C0] net_ratelimit: 14 callbacks suppressed [ 1537.756297][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1537.767728][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1537.773458][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1537.779200][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1537.784957][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1537.790688][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb60a}], 0x2}}], 0x1, 0x0, 0x0) [ 1538.051794][T20495] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1538.103412][T20379] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1538.226792][T20159] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200090004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb60b}], 0x2}}], 0x1, 0x0, 0x0) 20:59:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001007e01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000010004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb60c}], 0x2}}], 0x1, 0x0, 0x0) 20:59:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000102000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb60d}], 0x2}}], 0x1, 0x0, 0x0) [ 1538.495411][T20840] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xb60e}], 0x2}}], 0x1, 0x0, 0x0) [ 1538.725330][T20842] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000006000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc600}], 0x2}}], 0x1, 0x0, 0x0) 20:59:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000100ff01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1538.947132][T20935] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1538.958565][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1538.958605][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1539.095041][T21065] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1539.196280][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1539.202136][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000014004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000003f00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc602}], 0x2}}], 0x1, 0x0, 0x0) [ 1539.399388][T21492] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc604}], 0x2}}], 0x1, 0x0, 0x0) 20:59:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001007e01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1539.657612][T21506] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc605}], 0x2}}], 0x1, 0x0, 0x0) 20:59:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000007000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000025004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc606}], 0x2}}], 0x1, 0x0, 0x0) [ 1539.935758][T21618] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1540.049405][T21636] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1540.126685][T21853] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1540.184127][T22053] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1540.198353][T22143] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 [ 1540.213004][T21618] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000b0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc607}], 0x2}}], 0x1, 0x0, 0x0) 20:59:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000004000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc609}], 0x2}}], 0x1, 0x0, 0x0) 20:59:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d02000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000008000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc60a}], 0x2}}], 0x1, 0x0, 0x0) [ 1540.763603][T22390] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000003d004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc60b}], 0x2}}], 0x1, 0x0, 0x0) [ 1540.908369][T22393] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1540.925938][T22527] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 20:59:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc60c}], 0x2}}], 0x1, 0x0, 0x0) [ 1540.989363][T22606] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xc60d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0220100004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d03000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd000}], 0x2}}], 0x1, 0x0, 0x0) [ 1541.352920][T22714] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000004800000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd600}], 0x2}}], 0x1, 0x0, 0x0) 20:59:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000009000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1541.655966][T23041] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd602}], 0x2}}], 0x1, 0x0, 0x0) [ 1541.855464][T23043] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1541.918473][T22714] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000063004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd603}], 0x2}}], 0x1, 0x0, 0x0) [ 1542.107414][T23156] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1542.125423][T23265] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 20:59:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd604}], 0x2}}], 0x1, 0x0, 0x0) [ 1542.165189][T23041] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd605}], 0x2}}], 0x1, 0x0, 0x0) 20:59:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200200004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d04000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd606}], 0x2}}], 0x1, 0x0, 0x0) 20:59:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000004c00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd607}], 0x2}}], 0x1, 0x0, 0x0) [ 1542.627635][T23480] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000a000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd608}], 0x2}}], 0x1, 0x0, 0x0) [ 1542.778808][T23802] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd609}], 0x2}}], 0x1, 0x0, 0x0) [ 1542.940067][T23804] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1542.955871][T23814] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000007e004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d05000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd60a}], 0x2}}], 0x1, 0x0, 0x0) 20:59:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd60b}], 0x2}}], 0x1, 0x0, 0x0) [ 1543.116283][ C1] net_ratelimit: 16 callbacks suppressed [ 1543.116289][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1543.121962][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1543.331408][T24155] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1543.356285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1543.362144][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1543.542093][T24244] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0210200004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000006800000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd60c}], 0x2}}], 0x1, 0x0, 0x0) 20:59:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d06000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000b000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xd60d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000068034d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1543.908389][T24362] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe000}], 0x2}}], 0x1, 0x0, 0x0) [ 1543.981178][T24482] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1543.996326][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1544.002102][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1544.007895][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1544.013628][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1544.019420][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1544.025157][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1544.047118][T24512] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe600}], 0x2}}], 0x1, 0x0, 0x0) [ 1544.096960][T24364] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000010000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1544.177837][T24546] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000006c00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200230004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe602}], 0x2}}], 0x1, 0x0, 0x0) 20:59:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d07000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe603}], 0x2}}], 0x1, 0x0, 0x0) 20:59:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe604}], 0x2}}], 0x1, 0x0, 0x0) [ 1544.638819][T24909] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe605}], 0x2}}], 0x1, 0x0, 0x0) [ 1544.728972][T24546] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000073034d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe606}], 0x2}}], 0x1, 0x0, 0x0) [ 1544.901104][T25024] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1545.010419][T25022] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe607}], 0x2}}], 0x1, 0x0, 0x0) [ 1545.070373][T24802] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 20:59:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000048000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000007400000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1545.248220][T25349] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1545.417189][T25024] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02003f0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe609}], 0x2}}], 0x1, 0x0, 0x0) 20:59:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d09000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000000a84d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe60a}], 0x2}}], 0x1, 0x0, 0x0) [ 1545.654377][T25576] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000007a00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe60b}], 0x2}}], 0x1, 0x0, 0x0) [ 1545.852832][T25793] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe60c}], 0x2}}], 0x1, 0x0, 0x0) [ 1545.904504][T25797] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xe60d}], 0x2}}], 0x1, 0x0, 0x0) [ 1546.058926][T25803] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1546.096732][T25572] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 20:59:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000004c000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf000}], 0x2}}], 0x1, 0x0, 0x0) 20:59:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf600}], 0x2}}], 0x1, 0x0, 0x0) [ 1546.270242][T25913] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200400004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf601}], 0x2}}], 0x1, 0x0, 0x0) 20:59:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf602}], 0x2}}], 0x1, 0x0, 0x0) [ 1546.644213][T25793] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0a000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100000000ffffff8c00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000000ff4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf603}], 0x2}}], 0x1, 0x0, 0x0) [ 1546.847930][T26579] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf604}], 0x2}}], 0x1, 0x0, 0x0) 20:59:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000064000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf605}], 0x2}}], 0x1, 0x0, 0x0) [ 1547.043646][T26779] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1547.061870][T26579] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf606}], 0x2}}], 0x1, 0x0, 0x0) 20:59:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200480004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf607}], 0x2}}], 0x1, 0x0, 0x0) [ 1547.322744][T26703] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf608}], 0x2}}], 0x1, 0x0, 0x0) 20:59:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0b000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1547.499732][T26699] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf609}], 0x2}}], 0x1, 0x0, 0x0) [ 1547.589424][T26927] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1547.680170][T27150] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1547.704803][T26779] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100000000fffffff600000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf60a}], 0x2}}], 0x1, 0x0, 0x0) 20:59:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001024d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf60b}], 0x2}}], 0x1, 0x0, 0x0) [ 1547.999803][T27316] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000068000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf60c}], 0x2}}], 0x1, 0x0, 0x0) [ 1548.156298][ C0] net_ratelimit: 14 callbacks suppressed [ 1548.156304][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1548.167688][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1548.173471][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1548.179223][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1548.184997][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1548.190755][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1548.297687][T27592] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d10000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1548.344505][T27652] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02004c0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0xf60d}], 0x2}}], 0x1, 0x0, 0x0) 20:59:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100000000fffffdf900000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x20001140}], 0x2}}], 0x1, 0x0, 0x0) [ 1548.637068][T27822] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001034d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x20002000}], 0x2}}], 0x1, 0x0, 0x0) [ 1548.699376][T27592] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1548.798873][T27816] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7fffeffa}], 0x2}}], 0x1, 0x0, 0x0) 20:59:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x8}}], 0x1, 0x0, 0x0) 20:59:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d14000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000006c000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x2}}], 0x1, 0x0, 0x0) [ 1549.148392][T27935] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x3}}], 0x1, 0x0, 0x0) [ 1549.337022][T28068] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1549.356296][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1549.362158][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200680004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100000000000000ff00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1549.386779][T28290] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x7}}], 0x1, 0x0, 0x0) [ 1549.455302][T28372] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 20:59:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x10}}], 0x1, 0x0, 0x0) [ 1549.596279][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1549.602059][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001044d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x300}}], 0x1, 0x0, 0x0) 20:59:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d25000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000074000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1549.836438][T28694] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x700}}], 0x1, 0x0, 0x0) [ 1549.936678][T28668] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x4000}}], 0x1, 0x0, 0x0) [ 1550.099672][T29016] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01008000a0ffffffff00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x100000}}], 0x1, 0x0, 0x0) [ 1550.154650][T29126] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 [ 1550.186829][T29124] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02006c0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000007a000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x8000a0}}], 0x1, 0x0, 0x0) 20:59:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d3c000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1550.500290][T29348] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1550.738031][T29016] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001054d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) 20:59:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01ffffffffffffffff00000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1550.947685][T29461] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) [ 1551.062490][T29467] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x3000000}}], 0x1, 0x0, 0x0) 20:59:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000030001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1551.120810][T29458] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 20:59:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x7000000}}], 0x1, 0x0, 0x0) [ 1551.253704][T29693] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x10000000}}], 0x1, 0x0, 0x0) [ 1551.408722][T29595] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200740004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x40000000}}], 0x1, 0x0, 0x0) 20:59:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d7e000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x8dffffff}}], 0x1, 0x0, 0x0) 20:59:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001064d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000200000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0xa0008000}}], 0x1, 0x0, 0x0) [ 1551.896182][T30282] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000050001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0xf0ffffff}}], 0x1, 0x0, 0x0) [ 1552.067114][T30305] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02007a0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0xffffff8d}}], 0x1, 0x0, 0x0) [ 1552.176893][T30281] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001074d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0xfffffff0}}], 0x1, 0x0, 0x0) [ 1552.369603][T30316] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d68030000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x10000000000000}}], 0x1, 0x0, 0x0) 20:59:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000300000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1552.582150][T30507] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x8000a0ffffffff}}], 0x1, 0x0, 0x0) 20:59:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x100000000000000}}], 0x1, 0x0, 0x0) [ 1552.762390][T30685] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1552.789671][T30463] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 20:59:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x200000000000000}}], 0x1, 0x0, 0x0) 20:59:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000060001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1552.839339][T30797] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x300000000000000}}], 0x1, 0x0, 0x0) [ 1552.969707][T30909] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1553.060731][T30507] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d73030000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x700000000000000}}], 0x1, 0x0, 0x0) 20:59:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001084d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200ff0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000400000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x1000000000000000}}], 0x1, 0x0, 0x0) 20:59:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) [ 1553.394659][T31562] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1553.490512][T31557] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1553.516288][ C1] net_ratelimit: 16 callbacks suppressed [ 1553.516295][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1553.526883][T31450] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1553.527687][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x8dffffff00000000}}], 0x1, 0x0, 0x0) 20:59:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d00740000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0xf0ffffff00000000}}], 0x1, 0x0, 0x0) [ 1553.766287][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1553.772200][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000500000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000070001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0xffffffff00000000}}], 0x1, 0x0, 0x0) [ 1554.007172][T31671] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1554.053443][T31783] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0xffffffffa0008000}}], 0x1, 0x0, 0x0) [ 1554.210004][T31954] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1554.238150][T31557] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1554.296692][T32005] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 [ 1554.396311][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1554.402167][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1554.407975][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1554.413681][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1554.419460][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1554.425179][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001094d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020fff0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x2}}], 0x1, 0x0, 0x0) 20:59:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d00ff0000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000090001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000600000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1554.647711][T32229] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) [ 1554.863754][T32237] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x7}}], 0x1, 0x0, 0x0) 20:59:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x10}}], 0x1, 0x0, 0x0) 20:59:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004df2ffff7f000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1555.144321][T32343] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1555.197888][T32236] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 20:59:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) 20:59:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000a0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1555.259147][T32229] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1555.394891][T32348] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1555.587978][T32572] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000010a4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x700}}], 0x1, 0x0, 0x0) 20:59:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000700000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000005000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004df8ffff7f000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x4000}}], 0x1, 0x0, 0x0) [ 1555.837141][ T421] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000b0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x100000}}], 0x1, 0x0, 0x0) 20:59:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000006000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1556.053056][ T425] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x8000a0}}], 0x1, 0x0, 0x0) [ 1556.204252][ T532] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000800000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1556.281312][ T546] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1556.311304][ T649] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 20:59:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) [ 1556.329002][ T723] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000010b4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) 20:59:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000020100001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004df9ffff7f000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x3000000}}], 0x1, 0x0, 0x0) [ 1556.879462][ T807] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1557.069493][ T723] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000900000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x7000000}}], 0x1, 0x0, 0x0) 20:59:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000007000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x10000000}}], 0x1, 0x0, 0x0) [ 1557.216504][ T1205] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x40000000}}], 0x1, 0x0, 0x0) [ 1557.447811][ T1199] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1557.506687][ T1346] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x8dffffff}}], 0x1, 0x0, 0x0) 20:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xa0008000}}], 0x1, 0x0, 0x0) [ 1557.555267][ T1432] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1557.573930][ T1205] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001104d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xf0ffffff}}], 0x1, 0x0, 0x0) 20:59:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000200001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d1fffffff000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xffffff8d}}], 0x1, 0x0, 0x0) 20:59:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000a00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xfffffff0}}], 0x1, 0x0, 0x0) 20:59:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000008000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x10000000000000}}], 0x1, 0x0, 0x0) [ 1558.188439][ T1881] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x8000a0ffffffff}}], 0x1, 0x0, 0x0) 20:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x100000000000000}}], 0x1, 0x0, 0x0) [ 1558.482675][ T2098] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x200000000000000}}], 0x1, 0x0, 0x0) [ 1558.556297][ C0] net_ratelimit: 14 callbacks suppressed [ 1558.556301][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1558.568258][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1558.574017][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1558.579806][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1558.585625][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1558.591367][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1558.645372][ T2208] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001234d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x300000000000000}}], 0x1, 0x0, 0x0) [ 1558.858103][ T2236] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000010200001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01020000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x700000000000000}}], 0x1, 0x0, 0x0) [ 1559.008380][ T2208] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000b00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x1000000000000000}}], 0x1, 0x0, 0x0) 20:59:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) 20:59:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000009000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1559.150196][ T2763] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x8dffffff00000000}}], 0x1, 0x0, 0x0) [ 1559.348489][ T2767] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xf0ffffff00000000}}], 0x1, 0x0, 0x0) 20:59:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01030000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1559.526506][ T2993] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1559.640329][ T2986] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 20:59:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xffffffff00000000}}], 0x1, 0x0, 0x0) 20:59:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001484d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000003f0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1559.756279][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1559.762121][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1559.778385][ T3376] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xffffffffa0008000}}], 0x1, 0x0, 0x0) [ 1559.996285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1560.002194][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:59:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01040000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01001000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1560.152270][ T2993] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:59:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000a000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1560.438615][ T3491] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1560.644307][ T3605] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1560.819182][ T3701] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1560.892613][ T3489] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1560.956509][ T3934] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000014c4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:59:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01050000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000400001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:59:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:59:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01004800000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000010000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 20:59:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1561.361892][ T4261] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 20:59:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1561.507525][ T4462] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 20:59:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:59:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01060000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1561.661910][ T4480] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 20:59:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1561.844906][ T4477] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1562.017373][ T4702] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1562.173745][ T4480] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001604d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000480001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000012000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01004c00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1562.416422][ T4924] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01070000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1562.641878][ T4971] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01006800000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1562.845299][ T5033] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1563.046131][ T5146] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1563.204426][ T5033] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001684d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000014000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000004c0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01080000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1563.393450][ T5470] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01006c00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1563.530695][ T5590] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1563.564142][ T5592] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 21:00:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1563.635069][ T5594] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1563.778040][ T5610] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1563.926282][ C1] net_ratelimit: 16 callbacks suppressed [ 1563.926289][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1563.937690][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000640001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000016c4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1564.120535][ T5820] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1564.156294][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1564.162048][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000003d000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01090000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01007400000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1564.283339][ T6205] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1564.564090][ T6280] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000680001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1564.762762][ T6314] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1564.796302][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1564.802069][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01007a00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1564.807861][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1564.813578][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1564.813639][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1564.825007][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1564.962229][ T6276] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1565.019308][ T6205] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1565.321706][ T6832] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000040000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010a0000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001744d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:00:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x2}], 0x1, 0x0, 0x0) [ 1565.466939][ T6833] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 21:00:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000006c0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000003000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1565.652787][ T7059] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x3}], 0x1, 0x0, 0x0) [ 1565.779228][ T7166] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1565.873609][ T7169] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x7}], 0x1, 0x0, 0x0) [ 1565.934920][ T7239] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 [ 1565.951480][ T7059] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x10}], 0x1, 0x0, 0x0) 21:00:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000017a4d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x300}], 0x1, 0x0, 0x0) [ 1566.222991][ T7252] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000007e000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010b0000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x700}], 0x1, 0x0, 0x0) 21:00:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000005000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x4000}], 0x1, 0x0, 0x0) 21:00:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000740001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1566.553442][ T7606] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x100000}], 0x1, 0x0, 0x0) 21:00:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x8000a0}], 0x1, 0x0, 0x0) [ 1566.709490][ T7827] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x1000000}], 0x1, 0x0, 0x0) 21:00:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01100000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1566.818689][ T7828] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1566.890724][ T7933] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001007e01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x2000000}], 0x1, 0x0, 0x0) [ 1567.178120][ T7933] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000ff000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x3000000}], 0x1, 0x0, 0x0) 21:00:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000007a0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000006000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1567.320297][ T8359] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x7000000}], 0x1, 0x0, 0x0) [ 1567.419878][ T8474] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1567.434579][ T8482] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 [ 1567.451975][ T8484] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000007000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x10000000}], 0x1, 0x0, 0x0) [ 1567.607061][ T8523] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x40000000}], 0x1, 0x0, 0x0) 21:00:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x8dffffff}], 0x1, 0x0, 0x0) 21:00:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01230000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1567.950882][ T8704] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000ff0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0xa0008000}], 0x1, 0x0, 0x0) 21:00:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000100ff01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020094e000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000009000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0xf0ffffff}], 0x1, 0x0, 0x0) 21:00:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0xffffff8d}], 0x1, 0x0, 0x0) [ 1568.277462][ T9202] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1568.377008][ T9242] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0xfffffff0}], 0x1, 0x0, 0x0) [ 1568.456890][ T9223] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x10000000000000}], 0x1, 0x0, 0x0) [ 1568.558381][ T9042] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100000a000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x8000a0ffffffff}], 0x1, 0x0, 0x0) [ 1568.749151][ T9202] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01480000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000002004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x100000000000000}], 0x1, 0x0, 0x0) 21:00:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001007e01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1568.956283][ C0] net_ratelimit: 14 callbacks suppressed [ 1568.956299][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1568.967698][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1568.973460][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1568.979207][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1568.984984][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1568.990733][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200020004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x200000000000000}], 0x1, 0x0, 0x0) [ 1569.125981][ T9632] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x300000000000000}], 0x1, 0x0, 0x0) [ 1569.194988][ T9789] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 21:00:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x700000000000000}], 0x1, 0x0, 0x0) [ 1569.279261][ T9793] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1569.310898][T10037] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x1000000000000000}], 0x1, 0x0, 0x0) [ 1569.326383][T10121] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000003004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100000b000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x4000000000000000}], 0x1, 0x0, 0x0) 21:00:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d014c0000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x8dffffff00000000}], 0x1, 0x0, 0x0) 21:00:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0xf0ffffff00000000}], 0x1, 0x0, 0x0) 21:00:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d02000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1569.810234][T10570] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200030004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0xffffffff00000000}], 0x1, 0x0, 0x0) 21:00:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0xffffffffa0008000}], 0x1, 0x0, 0x0) [ 1569.956595][T10679] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01002010000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1570.141274][T10741] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1570.156292][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1570.162085][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1570.214522][T10567] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 21:00:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01680000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000005004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1570.296898][T10901] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1570.317816][T11012] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1570.396292][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1570.402031][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1570.726715][T11126] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d03000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000020000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200040004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d016c0000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000006004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1570.956642][T11554] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1571.136350][T11666] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01001020000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1571.214851][T11667] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1571.499138][T11659] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d04000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000007004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1571.668289][T11885] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01740000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200050004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100003f000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1571.837710][T12311] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1572.103181][T12429] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1572.225391][T12323] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1572.442351][T12434] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1572.546503][T12311] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d05000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000009004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d017a0000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1572.857105][T12429] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200060004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000040000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1573.138783][T13071] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1573.168458][T13075] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1573.246201][T13180] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 21:00:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1573.335107][T13187] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1573.558780][T13293] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1573.891690][T13071] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d06000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000300000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200070004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000048000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000a004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) 21:00:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1574.263415][T13737] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1574.326287][ C1] net_ratelimit: 16 callbacks suppressed [ 1574.326293][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1574.337854][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1574.359595][T13740] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1574.471140][T13739] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1574.525428][T13847] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1574.556292][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1574.562062][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x0}], 0x1, 0x0, 0x0) [ 1574.957224][T13847] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d07000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000000b004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200080004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 21:00:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000500000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100004c000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x3, 0x0, 0x0) [ 1575.185503][T14494] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1575.196311][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1575.202493][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1575.208311][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1575.214142][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1575.220447][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1575.226182][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1575.251968][T14497] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 21:00:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x10, 0x0, 0x0) [ 1575.302802][T14500] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1575.328265][T14501] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1575.340886][T14575] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000010004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1575.447052][T14497] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 21:00:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x2, 0x0) 21:00:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000600000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x3, 0x0) [ 1575.861738][T14939] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d09000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200090004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000068000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x7, 0x0) 21:00:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000014004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000700000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x10, 0x0) [ 1576.163083][T15059] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1576.255227][T15060] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x300, 0x0) 21:00:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x700, 0x0) [ 1576.311405][T15178] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1576.325386][T15181] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 [ 1576.392973][T15167] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000ffffff1f004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x4000, 0x0) 21:00:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100006c000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1576.652822][T15059] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1576.974563][T15178] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0a000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x100000, 0x0) 21:00:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000900000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1577.143897][T15607] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x8000a0, 0x0) 21:00:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x1000000, 0x0) 21:00:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000003d004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000074000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1577.527164][T15621] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x2000000, 0x0) [ 1577.607788][T15732] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x3000000, 0x0) [ 1577.798517][T15625] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x7000000, 0x0) [ 1577.862740][T15922] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 21:00:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x10000000, 0x0) [ 1577.957820][T15621] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1578.119684][T15955] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0b000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000b0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x40000000, 0x0) 21:00:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000a00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100007a000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000003f004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x8dffffff, 0x0) 21:00:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0xa0008000, 0x0) [ 1578.532308][T16393] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0xf0ffffff, 0x0) [ 1578.658790][T16613] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0xffffff8d, 0x0) 21:00:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0xfffffff0, 0x0) [ 1578.888542][T16618] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x10000000000000, 0x0) [ 1579.159817][T16621] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100c0ed000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x8000a0ffffffff, 0x0) 21:00:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200100004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000b00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d10000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000040004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x100000000000000, 0x0) [ 1579.356304][ C0] net_ratelimit: 14 callbacks suppressed [ 1579.356310][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1579.367750][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1579.373523][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1579.379274][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1579.385065][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1579.390822][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1579.612573][T17277] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1579.643653][T17281] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 21:00:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x200000000000000, 0x0) [ 1579.684446][T17285] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x300000000000000, 0x0) 21:00:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01201000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1579.779826][T17165] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x700000000000000, 0x0) 21:00:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000ff000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1579.914124][T17283] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x1000000000000000, 0x0) 21:00:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000348004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1580.210935][T17506] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1580.387595][T17283] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1580.556294][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1580.562066][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1580.569733][T17723] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1580.639745][T17277] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200230004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x4000000000000000, 0x0) 21:00:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01002000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d14000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1580.796285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1580.802120][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x8dffffff00000000, 0x0) 21:00:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000040000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1580.923441][T17850] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0xf0ffffff00000000, 0x0) [ 1581.024011][T17857] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1581.088492][T17963] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0xffffffff00000000, 0x0) 21:00:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000368004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0xffffffffa0008000, 0x0) [ 1581.249125][T18080] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ecb-twofish-3way,sha1-ni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = syz_open_dev$vbi(&(0x7f00000011c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100a000800000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200480004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) preadv(r0, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/15, 0xf}, {&(0x7f0000000100)=""/56, 0x38}, {&(0x7f00000011c0)=""/180, 0xb4}, {&(0x7f0000001280)=""/255, 0xff}], 0x4, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01102000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d25000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000011c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000001500)={&(0x7f0000001200)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @multicast2}, 0x1, 0x0, 0x1, 0x1}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], 0x228}, 0x8000) r2 = accept$alg(r0, 0x0, 0x0) uname(&(0x7f00000000c0)=""/75) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = getpid() r4 = getpgrp(0xffffffffffffffff) r5 = getuid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001400)=0x0) fstat(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000002dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002e40)={0x0, r1, 0x0, 0x9, &(0x7f00000014c0)='skcipher\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004840)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000002e80)=0xe8) getgroups(0x1, &(0x7f0000004940)=[0xee01]) fcntl$getownex(r1, 0x10, &(0x7f0000004980)={0x0, 0x0}) stat(&(0x7f00000049c0)='./file0\x00', &(0x7f0000004a00)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000004a80), &(0x7f0000004ac0)=0x0, &(0x7f0000004b00)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000004b40)=0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004b80)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000004c80)=0xe8) fstat(r2, &(0x7f0000004cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = socket$inet6_udplite(0xa, 0x2, 0x88) r20 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r20) sendmsg$netlink(r1, &(0x7f0000004e80)={&(0x7f00000012c0)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001380)=[{&(0x7f0000001780)={0x1610, 0x1f, 0x2, 0x70bd2d, 0x25dfdbfe, "", [@generic="7a9f64ff4ca939a49e70832a6fa27872ce99ea5a62481106b38d69eddd878d07f1fd899ace1ac405cb716702f4cef75ba725d6868776f924833160a80a55f991a2fb97476247307e4321d456e5d6a7516008e642e79d", @generic="a0ce5ff755f7dd6c0c78838e2cc4334a06be90ca3a2d0d56fb392b8febbf35b1c4a5719edbb29bde46becb9ba3f4edeee7cc969d3da096ec1776dfede1b09ac5685ce356c8a28b936185971c5de5ad7394daa4e14011a64e147ca2d7a422c51d3a4372559a8445a24b8154f7aafbe337e20bb805f72ae20bd34cf97524ae8e56daf4a9", @generic="b371290eafc787ed28c449263817f96a2fce4d4c99423d65a6ae9cf95036a1144c373a9a2ad19229bc784fefc43517cd3752878b69aab95cb34638f0892eb3d23992dc703011b3d9429d2ed0863636d5a5e4b20357e5198a47a96c963d3498e3e109b550c24b8d6ef12feb34d96989cc109e4e2079a9753f6eab5f80e84090bf3dd7212a59c0c368eb15fce78df7df076d063d393cea2e92b933e3cc59d58384c3b965d1c8a87a2168837d4732a315152f4d05644639df9b296964756e749cf8bed8f69bfa219025387d6718a55952278bdbd914c2f573393d0d0938fd", @typed={0x8, 0x6e, @pid=r3}, @generic="a1d6d81360b4bd97abbf0807cf8ac4857d3a669b7ca8d253e95906e283bba3a5d30672d4769ff51230890714b62841966a27cf502ccfe33368e2485f3b36e2e8342e3e555ef4301d88fe4c7315b0603ef5240e758efb96b293a68ab334ef4033bdd3f05ea802982e28300fc882d3f70793118a77508649f8a9d1ffdac338cdaa31cfce5d21e2eacc3363f9cc6c68e629df46b0034e6c23e21addde2f8af08ab8038dd7c27b8da2d1ca1b787ee9c41585e7f96b8fd70857af335d2a9be6c028ccdf2ce88fec593ea19fa49ae42551889ca7b82ae54dc68e6a5edf4a3dba5a451bee59c7bf398297b816a9d84cc610fb51309498545ca2eeb9a78443cb9902380c9d100956e68a59b16183a98ed42e2dd07d801d96dffb58b18599a7d49d6cc8651b6952dc7b6a8982edaec162c6da8445316667f76c92fcdbbfa41de1b89769533cb93b4bf2037305f8851d8bd290d1672dd779bfa9569e2b01c0e0582c1ba88a2000f85b6e04204540ea817e5d3d401ee72ffcfe0d6f898556ec79350099cc6237615ed61092c4ae9e586df82bf9dae2f7680a6987f3741489acb3e891a280b36132ce3b6cf9257f956116cfb8b9a35cf2956a47f28d417b136749490520faeb2bcbab6ee7bd22e1f7dcc9c1d81b590bade9e2395138e6ac92ce90cfbd8edb54ad45064b5ff63ccdd8093ecb26fbeb0559c57af119f946ffa32ca6bfdabef003be36d1d19147d08172da670f246f86bdcf5676db1e8e057a1ae501f0c1784342ffcb8681dd19daf4daeefe1c431108c123f360edd69cfaafba6b16da081f2dacd10d407bba61053618ccae56df97272462587436bae43046eae1e8acddf073723d05ebda7466ee4aeb0ac7afe3f0a025c5869c74034157099f47cc043a00e313245a03729d0282ba0e5d01305e422f378907b28aa6f4c62d90e7b7a92e0de20e1036be685db810fc12d61fc899f1e075d86fa85d3703abb9261f154abff9ec6130e2f4124a8abb6aab232fcb1dfd288dfcb543fcf530b5cbb3f6b78dfaa5c68adb7b47031b3c051a108c9bfd38a4b8bb9b5d4855b782d857abb739c8bbb0b4ee933087f67fbbcb111b1cab8f83ef43d7fc29c6a9d9e8f704df9d754ed04d3b66e9b7e563345d30a41fb5ca27424915ebfa2ab1d3486b8338d3242bb977892df61aeab399706e55115993b7dceb04705d4069629d1da91badba5c98475917a3c4356baf5bc1149692ca9370bdda0ac1f1f35a9ccad5cd1873e392de651cac56bb8f176217df8cc345b860a993dfbf46157a8c5270059add415e2c3fb9c7c8966cf0c553a58e1af9bfb2ad73893a00750fe58af568befce411bdf32f4ce4427c0176d0ca16625749eca4a79e7287ff17d4902ce00182d310115725583065e95f5fef5b8c538fbade542321eee287d488bdf3e5e4cef690508ec6c3752c9fb95819ed6999b54edd026eb8c187f2815f0da684fe787a83c136de786465b1af7edb6ea3a898ad66fccaeee0a95f4e692959e950cbf1379b1a0ac373b08488b61d9dc230017510c984395c4212ef51b4628e86bc95dccc93b76ef93dff52919bdb072e93123bf3e5ee2a8e87226cbdb6e0d4731bab46ceeac78fb077cb8431361e4dc1bc79dc79e4afc1f262e1af2277246d79aff00539b4d93c7eb0cf3bb2b20c6b1722ba070cd20bd0f60e0c831e51efecf8c565fc0e89bf60e4a19b59507aad72b215d0646aceac46cf1b84a2123c846741871245cd57b961e83371acd9726b133c2e949f7e04048e1e6e5855b7729521e967a1e6324755e76e3bdbcb1df069e298f3b14e4287068d6265e68c0f1e802f308896c7d0b9fa97288dce0b46ec6ec03e897810c3053e2be102a83082aed80cd823e6a48ddd1cc77de498365af32fb3346597cf0d73a0341a500eadbd2c6ed8382079572d93a2dce4147bdbab02685122b7448b5c875ec88915e98ed681deb203575abc15dcdcf20a2cfc703c0af246be2b010f7b2b1b6baf6641f3c67a4b0948eb6e4c24e568e895178e9a26aca41b8863638976a70aea961168ab26b62269ac81845825b5edb88a52a754dc36f5b4216474c1be221f512a781158345b3b9f650db19b3a38e6202961fae9bebe9240f759ea2a245a1bff1949dd048c98b9808dc88005a518e246ec4bae121d7f080212afba46754c4114991caf65051d6578c823e9190c3e6b184a55943270529a81a50153ac292702e73cd02c4093460443516b697a9396155082075ad8956c0e38fb33af3a3347bc70eb9ed37abe2e7ceda61a4a66c59dc32ffaddc63b4c768488c6a2b92fa50b951095a69b6e5d0a100fd62030be0e1dbd3d41ed7b9a3e555c4d56abf0072311a6cbd2b38b4ada6563dc978a1c38ab9535dfdf5feac9a9e4180e3a4a617e16a81fc42aa807e04f893b2bd81d402f1d2d1503289564fa4701bd51fdbfbd783d13e07c3facbe640bbc0a68cfcdab42ac85b1d0c8f5fd438e52a9fd5bdfe92b7feaf9d9830b111d61e32b0cf0e75f24dffd9799afe9848fb69804d0a248d08dd7b0e8d855f9cecc630c6b01c777acc8d034ac26b5347600e0b390178e998754e8b9843b34cef8a66ff4b9dc09b8462104e388ea1aad7d05b3fe594071e50ae87f982533bfda5c124b2b8df89f9d1ae282882e2bacc76af06a271114e158688cedcc2a2694e069d659cda5b5115c698ae8a0a2be9e63b1e25acbcb4e984f31f3c34d489f3fea1efe49176134703c507de53fd924b06beae53e091998412e5929ab4cc9502fee0ca8f618bd502fb4a18e12b98504d9a683b2e3b8da5de31ca89cb77cf59f1911243a7b25b4c0a9577bd2551a05eaa83c1dfa6efe03c993d0dd266ec7f160360ae8c3beda5cf1e9c92b0d11e7d28ff011a637c906ffb36f5371d5cbe9e82dab1895ab45d902b05227a0f542c568732bfd4eaa0259c08d653c396aebf085d69ec68daa5b1c52f6253f35c28ccfdaae9d2eb8b7650235b135f4e36a7b1fe2a233f8b2099d6d7ee708f2eaaf0061df127f6ded7991532da0a85ae48f2fc49dc8475b2d6f0ecfa0da38cb7175cb59e5747b2912da28f34e4bb6640993b1ea87de8fcaa445285e0f1cb902c9c58ad99dcba79ac2b46b584f5c68207783c5a2b0c5c384e5a814baf7c0b28c951ec76f7cc42df629591e7ba084f2e8e3479aa8ca1aaa7515e0bcf3c8b07d14dbb7b974b9378c94ac638fd8720a6c995f9ee4fbe5d89d3487f760d2da9a53b00888bba3a6d0bf21d492a8d6e8973c4a4842b630acfd37f7f1f6c00431d7d1af838e02e1ed11c30f12dcad022a006f0fa0dd092341a81fe96159670dc1905a107ee5ef9cc14ecc9b0a1cfd0519aed50e6bb4ac86a85dbaae4c199b910e26989518c26813b9928bb88769a2a13d212fd87fc260e93a350b4d395086fd54f5175423b4c3dbea52fdbd5b0d239ee72e74c01f592f5094194374cf81cfe2cf5803fd850d773ad5a28c0cd05844819f8001c4ea485daf0d5ca603ac0ddff950effa8203f90cf4cd5c8c2d7550d026cfd8181b1983ebf29511a597cc8326c431b1e15c73cce73c66687e5c5770ac874260ffae079f050214f921ab92f57af10de346bc1645debd1f96438719c5017a6a1cc9acdab4d585f3d6becccacbaa6626174bddd95afb3b3485a4baa9d4ae9b6115f47a4c3a0af8800622e74a8e0261c3d357ebe1f5f80f0de9e43de4d0586ad655603737ecace1fdf859b55fc8f65af70278011c7c9c7e15986f61e5161f9a457e790a6ae3ac514065ab2064cd42a4529048d0cec287c85c65325af73ca9478aba3151be0ea549b289198b68b72975950c6ea982ac280aff3148fc2b35840493054ce668012d5add099a3e156dc5c269a773ec74ebaa3dc18cc9937d3e610d99f949de1132bda9bc14b8b99c8320710007a48991e4ddd067103ab871f576750fe716ebf025b66f1bf63322a17fcebba4fc63c9739278a3cebb93e45ffe4dc94e7504be40dbe78f83e31a29302e80f83a1da85fcba123514a21cce826e9464aea19002e247302c556defbb99b66c8764cdf29cf3105afc42f0d9ace4ada66746b306cb78ac6f0dee8ab1d6c3445a23205290569c0f29053b1bd1a2d47089edff1334cc143d2ac487c4d906157a61a5172162efd996dc599620474bdfd11d06da5c29fe8aed8e5c9717b4f94b45f4a6bd7e4cbb036aeab66977f2423a766bc42246a1bd95e2e32d067badf9416c7c6922a2c9a65a9d015e7ed69c222a8b70f03e49980f2aed4d4e572cdd903e4043bb602b14d6c93d50ea8fcbad213c7c022079f74c7c3e3c13572eaaa850a3a40d746ce13e59cf9675f8c11a702037ae5016e3ca5c04e12d14185ff74bf40f23ef79eb848f708b74cd0b4eb0f108f7a005450d15339c1e2b693b862efb9996b4cad77fccc7673fa0cb0692dd43a522948ee0ad74c8e316e3708c4be51b82dc4c5cc7358b2ec83fc698310742c33373136c00d4ecfd6df1e9578842a7089e4f9f26ec4f73c10261c3e0ee1ce2008393606427c6767907a37a465459f85ebbf4cff729440fcad81dea6e7f2b356b934650cca21c0381c029ce38fa85ef03584eb9ec0b3449d6b3756faad4869d71bc5aa36610b10a43605495522564c988a26f0ea5c62932d694fb5369d304aa527d1408e4bc57133020c7b381ec13115453bcbf036b7140e1e4a700bcb34a332a7b03fbe456a4c1afa4d9e26c13d95ace6187140a86a16b0923539bc0e0311c9083d7e534c90970226093a75f68dc9a4c9ad139a71555775ddcaa6bf87fbc99ca72b8ee2c2bd5f12b76698b17bcb5f61f7dcd2f80392073a1501c3e6dad6805235172b118f1ae95d702d5fe3f806f38f566366b22efb2bf72ea18141e6c2a5f758afcd3f3c59def76b35991f0365bfc9daa3a0fe7c8e5b9036c27fe76895533953369ab274ddc4adb43747ce84cf9ed1c2ed79073ecf4bc5a2ddf52d374165781e7d8c8a7db1e6915eaf0a02432a96f938736cc587d4213ea1d0720eee845ac1568737c0580124321618279a000eac9a3adb308bf923aa3ce338ba269fb6415639eda187325a2230e87c78a2dc32ee83c7bd7705507097e780a41eb30dafa757ce8ed080438d0496a341090ea181d0ebcdec41ba0a4e41e56fbade491df2479bb7906d35a211ca1f39c08bdb3171a64ea6e26c662990d145aeb0cef83d8d73626572c2d4664038c88828d3056cd94a4092275622b04862e16528792f97e316031ed064bb02004e64b9115815fa49b15e91c4fc7bb73825546b66424a893139fa1c04ec8f0953dbeac2a4f988ab27e60b6717fb6626cc90b130b0a0cbdff9fcd109f42339158d9f21a5c0726db161b2ef5d176ffb4f74edf7b77aed18e3114a9e336e79ae42ef3bb2b9d974d7538e0a4580a286a95498fed2b4f4bf0f8db36565ce9fe7faacb95bc73e801c4acefea776da258c613a77f78e673e7626eb450a094971f3d9106115ceecc9f940095947317dbf792ce3d6ba6ee65877a73eec27f8bc0d7a8d7f7b8243f1eaf2fd0a4f078dd78281a3edb720e869aacc5610d5a34dffe5a0b1d175abcc924cd68f36d3395a7ad6b26b3f7cf0cafdc2e4e2097ea3527d117ba2b3474a89ea9f9e6fbc6087e0b0326ad5115a762b2f5fd0df10c4e5598a1fa6bf39174bdcba0417bd15e99331d7effcf022108ef1eb858bd35e2b791b2392298b810f2a01de8f9399d2d38852346fa652344084cdc32602592f57580b9f2a57ac542d6c582c5199f17ea3db2542d36df53d9e80727439c0dd6ca7c75d7c1b55fa871946b20a", @nested={0x3a0, 0x62, [@generic="caf87ffea433ad538c3477c6f367af0a122109563d7141b950813f427db5377bae32a0b79e5e", @typed={0x14, 0x59, @ipv6=@mcast2}, @generic="d0860df278b5eb8761", @generic="73b02ab7657cac1092b34ba6417b780ab4fe10e70964e24da889fe596b0a77ebf122685d2b70b1ffe43fdd2b08e94b57f6f84313930b07d08664da69703fbfcb85f1f42cb943c9e9bc6204fc3f711e680de7db79b0ebba3b0251b6138c3cf685cf4f0a5cf98c88fc554b894bf8a399c363305ad91719bf8bf8ada86b0c4279b5d9d3e3f08f2958bf2b7ce9d6a722982aa85383a43ddf1b3bfc", @generic="e9cf9ba60fe57981d8be6e9b2223b89ef8292e637649188842176ec16b0453b22f7578827bc717cb7663abc7a23ddbfc8d1b7782bcb4691924be17a15fb43e23d4de6363fe7f0018c1d02b8a25cb9b2072b1f664796aeae4599013362b76cfa99c403f5ed46a2cdabec5451c802b1b515500bce7452d0cf1f6e698f6df905ac2806608d9452bf69f4e48db0938ee9308a2dcfd51fb52373749f469f2093e860ea9c762773acdb3b1f9ec83ae0f738bd2267eb94c4b00", @typed={0x8, 0x96, @ipv4=@local}, @generic="f2c155c408c4e35ab7114bd7f5031372dca85645fbd6ef456318332984e3c6ce560502e02125d6d9fda1947651fbe91dbd1c68211e6cdb2fc7c77c8c04c987d98d6e3b02c9aed49daffb4bc1883b4009765bdf2630563cdcd62cb10bb6e975e7261e8587d70a73c8a2421f977d6ed5c29f03038bf118a906f7449a75c62d31fdc2cab7fd3837dd4ac070d0b60d49c2ff360fb72beb5945126a1c08c9a7c163461eeba217ea5c599251f0a3d23e2d25b79639e5eeb0dfe4ba8889fbacb042a59ea7e3", @generic="0a962a94eb83130821b5e81612ec66344cddc08a955aba2dd685581479002ef2efd5a8cc52b86c5925c75d4734a642d6833707dffb64fbfaeda713172dfd75b8d9b5cab4c87a3fb1ab0e4ccca7c066ac1129c6a7609b4a30600e8a5dcdcabfa22646a045475710548dcc11254cfe46f4b531deaa84056fe0c23ba8e9430d5d4ed8b0a418832a8089443ba6419b56177c799a8fd8b14d02d41477368f46aaea8329e2c4d92c773b57ae8d0faa8a", @typed={0x8, 0x5, @ipv4=@multicast2}, @generic="b14f7879d7e77c804201c522c1834c6d4fca286b1d3aa17616f986bd13b26cf6195ea545f531adc318b4ae8d3fc0679feb91aa9435bb9f2c73c753bdf5f6856da39e3a1101fdb927428f822bc7d6a83e5e1c2064971b57d1c9adcbf3a0c136dcff184b1591ed7ff61d094baf60f6dba0877bbd8de3ea124b7fe9def7c88716f56507bc1b9fd31c9549"]}, @generic="277f4c50ed63fb5d5b0a67afbf4dc19359d5013212162612d3b606fb5905cfdf4e2f53d33d0cdc592002f6ec1bb0934e86de1ffd542f896019b1f7eea1b58cb9f791420640f4f5344480966c7ce66b0c8f94135d072e6897605edc60d352a0", @generic="05e78754dee58ba6c0726f45dd0c55fc1e1d7de315ad6a710537c921d4e81141c4eca76e6be09af65457b00ac941afc54dd447dd38646ee6e97613c6f5d17e9beead"]}, 0x1610}, {&(0x7f0000002f00)={0x320, 0x36, 0x4, 0x70bd2c, 0x25dfdbff, "", [@typed={0xc, 0x2, @u64=0x1}, @generic="3ad31ca08d04da3b20e6d761cf53351c8a1d9caaad0bf9db352803417d46c5088825537808b73ee7a56760a5ce", @nested={0x118, 0x71, [@typed={0x8, 0x8d, @u32=0x8001}, @generic="ad9b0815fdd9543944a661f6b71b282813790803e4bbe39a2a9a7c06d82c5185dd8712f1cc94e7034bbadf03e75b9c6430a2f0352ff581b0f1b4f27ee91a5822f2aafc594b37", @typed={0x8, 0x32, @ipv4=@multicast1}, @typed={0x10, 0x80, @str='skcipher\x00'}, @generic="1472e421a9a52ecd0713b48d341daa89eb2fa33013f45f27371673a5da57f203ff9490b2783ee9ce04fcc88df3c2380a887b89788f7bea608405ec7742d352b065e38fd5646eef4f6aae791a599bf0a437ec319b00107cfce84648b1f93a57fc16aaa8bc792519725965f35c94a0edfb53a4638c041203466a2ea247314f17a42457817a1d35ee415e79b7166514e0a7a2cf913a9d1b45faba32318ece784f7558dae7", @typed={0x8, 0x1c, @pid=r4}]}, @nested={0xa8, 0x68, [@typed={0x8, 0x33, @ipv4=@rand_addr=0x100000001}, @generic="5e71b573dfcbd2d1d569ee17b80303bf857ead19e0d87001426c4c15b67dfd12ac1998f8c508ba4d735137d0e6a8df0507c90af65a016cc28de1204e3e42ac9b1ae8b8a60213133ca7de1bb9034ac4eb4dc9eca22d9d6b99f844f389c5f6f9d4564bea67d41c88d59611b7e321d8ed574a33d6a6110185d93a37b9c275610a2f61bfb08b867055b90e211b01df067115b4c5091b31c33bff44a4"]}, @typed={0x34, 0x28, @binary="350c5aedc24331ddc7faebfb795a302374c5cc3dc4a4b31105e643bdd8e14c5b17af5bbebd2eb480c156aae058efd0"}, @generic="41dda9a59b7b25aa34b626a43063ef9d5dfa8f5141f5e65aad1c28f768c940f28611d61a2af86a7e3746be06a9135a0c03d7b30533bc4a85360e053c428ff5a9d3880d83642fbac252b6c0d54fb439ecb032f2300193c351861210856ed23c6c6ab0048e7a5fe35fb0e2e9c2ada420f47e729aba33a52cc6549d68afd0bbf1bdf31624037a7fe9a63af91b434a9d94e28fe983139c167c6ff3521f8d7d9a4d205dc7f640e58c0c20e45d5d71ae89e280bb29edac1cdb6c1a8fd83774733dc0a31adfa53ec44b14d366984dca39aff589b53efed834378dc7403e7d6eebf123f7446476"]}, 0x320}, {&(0x7f0000001300)={0x60, 0x2a, 0x410, 0x70bd2c, 0x25dfdbfc, "", [@generic="80d1d2a7c99f388236de3a3ef3544d57f54bc4a70f8c988cf88f8b584e33b5cdf9f95df487579ab0fa900a2a352e9ba516a06d78a438bebf796fedaa7a83966d5966ca31c9386dd05e6ef848e0e76b72"]}, 0x60}, {&(0x7f0000003240)={0x258, 0x31, 0x200, 0x70bd26, 0x25dfdbfe, "", [@generic, @nested={0x98, 0x4e, [@typed={0x4, 0x5d}, @generic="c48ec97f121b3282ed66c078c85d2a7504e3d155d029539479819f6cb88542a3076dd0192e10cb35eb25ec276867088b4e42480a0dfb5b1d18b6aac1ef1a7651d3dfc2bec0f7c895d9bfb361396d664c6023ae83f262fa2d869c968968d6c00dabcddb752d21ef825a9b2f7f562458a9eb2152b45c6ba8ea80a33752d711e1d80a6caf2212ab40", @typed={0x8, 0x6a, @u32=0x55}]}, @typed={0x14, 0x7e, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @nested={0x54, 0x6, [@typed={0x4, 0x2b}, @typed={0x14, 0x82, @ipv6=@mcast2}, @typed={0x8, 0x31, @fd=r1}, @typed={0x8, 0x73, @str='em0\x00'}, @generic="551fa96d5859846ba9325320c3d1cd6037502a16b5ade9234da2191da132acef98450266ef51"]}, @typed={0x8, 0x45, @uid=r5}, @generic="37d6025763eca41a8c9124db8ac2ae0db8725f938df32ae6ce0eaed40d88fd0ac0dd033db327", @typed={0x1c, 0x96, @str='cbc(twofish-generic)\x00'}, @nested={0xfc, 0x59, [@generic="a6c12008de6920d9bb24060223e16b72c41b5bba2d0f67b7f9a02de006d864140efed138d8c37a59daabc615d184f3ea11ede75dc013bd8a3451a581b0f3fab0dc5718aff79eefa242a4", @typed={0x8, 0x46, @ipv4=@multicast2}, @typed={0xc, 0x52, @u64=0x192}, @generic="ed85cbb55947880fd52454397e832996ab10c2591babf0eedf3ef63bd359dce14c1f390669ac2775397863ce61ef1fb31330c4f2097ffbb45d894f5e77e300a4c9ce4e736d62923a4d93a0389f05566277cb9e5d220b8651a22d84b757b32f7b9e50", @generic="00c6b7ed8ad74251d578e97c7c4c4e913605f8b6", @typed={0x4, 0x5c}, @typed={0x4, 0x4}, @typed={0x1c, 0x7a, @binary="e16cc2ced5914ba354d64b062cada076ea739d58ebbf"}]}]}, 0x258}, {&(0x7f00000034c0)={0x1350, 0x16, 0x400, 0x70bd28, 0x25dfdbfb, "", [@typed={0x4, 0x68}, @generic="e5aff399d370ec6dbf0cce1116a833ceb912dc7e3a862caa7a76718993b92d21ad59abd85bdbb0cb79ed09cc78e1f8cde3ab5c37b999405ddd963152f4bef7360079d675111d17e37dc3611cce6dc2b6601282bda0181792f4d302ffa4c3d6f7744b29d4148961e83f017f46c8832c718fff033d5eea23c0e149dc37c0e526c2a39063099d859865136fd6abd1f490a9e84874583f280d2d2bd6fee1f0e7051fce68a7f42157d4d6d1b93b6859197a3014b583f801984a80ce9c6350e28448f37998e8061de81617e8959b8d1b5e594e58b7", @typed={0xc, 0x24, @u64=0x1c000000000000}, @typed={0x8, 0x58, @ipv4=@remote}, @generic="c19b20801e50d6e84302b36e91337616f7b15ccf214ec9a8977fab76d26fab8f687be211c71ec46dae679744c055a95bbc6953d7987bfd58f6aa32ad9d57ddfb57d488dcda68138f547cddab80c66ee186e0ca05bb6ed79094450672af1a253c06acde94c08d9300456fbd642db75bccaac5da6657b0715fe2bcccf6d299e0b6984f4021f20cd50589dff74820580e8a38fa2ee44514662be3b6d81a29d1eb0ce53a5f4127baf9b4ad48f281bf5fc48a10eacb7d412456a55f611397d8fd731b694ad481be885a07511cc7df50b4efc6e268d8a7f7b628c1d0e7bded312f9e9d76248193", @nested={0x1168, 0x2d, [@typed={0x8, 0x3f, @fd=r1}, @generic="2820b1a45ec8dbf249af4f013461c933b43572f06a4308f16c27f6d36bbb277ac91c5a9a1dd6c45aac913cd0ef6ed2fbeda9a232b8f97e5d4ed495f355b951bb6d8fc68157fb3354c674f166bd9f6b557b53c9a6198849ffaeccf49d666eb6851417d6e01b00", @typed={0xc, 0x5a, @u64}, @generic="e5d9928d885a6004ecb32ec9333fcd0300797eec43d6ebf78b8d3643685b2c99e3bafc99cdca68b1b55558e552ecd0ef8305ddd9417ccdff6b40936e4c7cc6aa041c3ad9179dcb16cc90c6b6e2db2e324cc74bddfffec56ebcf255e79ad7a237f161bf20aa939de4693a5cc95f967c72f254f8d8ab351412e590c907c968ef83c438c812f6888cd0164e9be3109eede1c1f2cb591a64260443f09d3d2702a28b64e7a95bf0a4705908389becef9ecb09e4731ca6ef1ff76cb53bf6162d6c3d1e66ca3df2949859b80686bb918837be901247d715af6b08ee7dcd", @typed={0x8, 0x4e, @fd=r0}, @generic="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", @typed={0x8, 0x7b, @ipv4=@multicast1}]}, @typed={0x8, 0x64, @ipv4=@dev={0xac, 0x14, 0x14, 0x15}}]}, 0x1350}], 0x5, &(0x7f0000004d40)=[@rights={{0x1c, 0x1, 0x1, [r0, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @rights={{0x28, 0x1, 0x1, [r2, r0, r0, r1, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r15, r16, r17}}}, @rights={{0x30, 0x1, 0x1, [r18, r1, r1, r2, r2, r0, r19, r0]}}], 0x110, 0x4000}, 0xa79544c488d0b226) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000001280)='cbc(twofish-generic)\x00', 0x15) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1581.779097][T18536] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r1 = dup(r0) write$UHID_INPUT2(r1, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], 0x1006) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000022c0)) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000002300)) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000100)=0xfffffffffffffffd, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) recvfrom(r1, &(0x7f0000002200)=""/179, 0xb3, 0x40010000, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000002340)='/dev/vsock\x00', 0xf862b2a79f1ffadf, 0x0) accept$alg(r0, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) getpid() write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x101b3) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) io_setup(0x1, &(0x7f00000000c0)=0x0) io_destroy(r3) [ 1581.862686][T18641] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000000000009e004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:20 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x6, @local}, 0x8, {0x2, 0x4e22, @empty}, 'yam0\x00'}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1582.032250][T18649] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1582.065150][T18656] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000011c0)={0x7, 0x4, 0x4, 0x7ff, 0x4, [{0x8, 0x6d, 0x7fff, 0x0, 0x0, 0x2000}, {0x5, 0x9, 0x6, 0x0, 0x0, 0x1400}, {0x9, 0x8, 0x3, 0x0, 0x0, 0x801}, {0x8001, 0x3f, 0x1, 0x0, 0x0, 0x200}]}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0xfffffffffffffd41) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) 21:00:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_GET_SECUREBITS(0x1b) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000001640)='/dev/vcs#\x00', 0xff, 0x503001) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000001740)) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x101, 0x43) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) r3 = socket$kcm(0x29, 0x6, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000001680)={'nlmon0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}) recvmsg$kcm(r3, &(0x7f0000001600)={&(0x7f00000000c0)=@tipc=@name, 0x80, &(0x7f00000014c0)=[{&(0x7f00000011c0)=""/243, 0xf3}, {&(0x7f00000012c0)=""/79, 0x4f}, {&(0x7f0000001340)=""/109, 0x6d}, {&(0x7f00000013c0)=""/208, 0xd0}], 0x4, &(0x7f0000001500)=""/235, 0xeb}, 0x40000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001780)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000001880)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x4794db3dff627708, 0x5, &(0x7f00000016c0)=@raw=[@jmp={0x5, 0xffffffff, 0x7, 0x4, 0x3, 0xfffffffffffffff0, 0xfb30acfb91fabb51}, @alu={0x4, 0x562, 0x2, 0x8, 0x4, 0x1, 0x4}, @jmp={0x5, 0x6, 0x0, 0xb, 0x7, 0x50, 0xffffffffffffffff}, @generic={0x9, 0xffffffff, 0x1, 0x2d, 0x4}, @call={0x85, 0x0, 0x0, 0x34}], &(0x7f0000001700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, [], r4, 0x1, r2, 0x8, &(0x7f00000018c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000001900)={0x4, 0xc, 0x4, 0x1}, 0x10}, 0x70) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x1e6, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x163}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000100000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02004c0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01002300000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001200)="0a5f75580c284403bc1b29b39b11263cdfb29d378b8aea7437b7021a215a88c709fd253c0c3e88f8c4bd500dc06b4dc5a15172c3ff824785bad8fbe876c2d8efd0f69fbb7c615f197fcdf14891bf86ef530cc779e8d07f4e54e9596a12c41c016c6b96caff30ca003cff44c0d5495b60bb73d9", 0x73) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x40, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f00000011c0)=r2) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d3d000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f00000011c0)=ANY=[@ANYBLOB="01007a0dba6d38131ea54d5d9f1530d6828234ca0091e409b11253a850d0b1659142d81c495b4936954a0cbb2abd7e37e1c119b30a73"], 0x16) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) write$binfmt_script(r1, &(0x7f0000001200)={'#! ', './file0', [{0x20, '('}, {0x20, 'cbc(twofish-generic)\x00'}, {0x20, '&!'}, {0x20, 'A@.'}], 0xa, "638ea0b203d45a2fcd0bacd7a3bd88f48b61ab7db5dd20d82f1e4e8e39fc7b8061abbf1eb5b6d16b26c1e05950c9e1f008d6e50bce58bffad3899eaf27714fc547cd69df9820d83618bd3e51342bd252848ff33ef09dc5bbc6891214a693d2b3b0c8c4ee956812c084940d1f90c72904ea209505642673dc0aa7a10660cd1b6c23eb3f"}, 0xad) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}}) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) [ 1582.602387][T19216] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1582.634933][T19214] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001200)="ab553fec94248c32e20000288a000000", 0x10) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x400000) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000100)) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1582.689083][T19277] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000200000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1582.883048][T19275] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000007ffffff2004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(xts(serpent))\x00'}, 0x2e) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x240000, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000040)={0xffffffffffffffff, {0x80000000, 0x4, 0x9, 0x2, 0x5, 0x1}}) 21:00:20 executing program 0: r0 = epoll_create(0x9546) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8, 0x300) sendmsg$nl_route(r1, &(0x7f0000001280)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x28200110}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)=@ipv6_getanyicast={0x14, 0x3e, 0x400, 0x70bd26, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x10) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = openat$cgroup_ro(r1, &(0x7f00000012c0)='memory.current\x00', 0x0, 0x0) r4 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000002c40)={&(0x7f0000001300)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f0000002580)=[{&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="dbdb30421840b02749fdd48349a6f5ad425ec56d56ba3fcdb21a1b344fc8c81ee9c808b1ce4d9d6bf4716e5f2d6098980163505ee17537d9136b0a002c0dd59e6bb41231ef1001d2f854b038428d48b21ebb383c173ed59180d77eb107d52c5eb2750a2ba5539a1338596c07ff50809c78f65e87aba3297cc2bcc8926524f338d6c46346d7279475a08699cbba635ae5100555c5892a601044f28b8d1dfc4d9a26e39e10d749e4d960038d1b358528689c4c5c9178b859184c", 0xb9}, {&(0x7f0000002f00)="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", 0x1000}, {&(0x7f0000002440)="f0883e8754f07034c3a722c0ffa376d0ce606c6d4716737c506f95e38a888b5e68453b3759d08a129fccf6078acfba4b831dc613da3229296f99cfc6293fddaea0515125506bec9280f801b7b31a63613b7a9a897129075a56dccaac9ff3d935b003c21d65c326d2d9134ed1a301b5e194850179c9c13ec47712d23fc2351fd7279a4274945a7400d7c0699e470d", 0x8e}, {&(0x7f0000002500)="3569cb13a768d790f9c58a3d56b787f9639695e23f0d71975ce03520cb3d8a9c8799a25b67716a9b26acbb8ab317e89fbd460c07b36043780e50435e1b23831806ba4b8d93c0bdd7f0b139af0f7d1607f8657588285483a0976c5492df84aba2be", 0x61}], 0x5, &(0x7f0000002600)=[{0xf0, 0x114, 0xffffffffffffffc1, "82c14c6031f12dfc8442421c228c8b9d7cf0760ea4c1f2fa435e8dc593fb03baced9bcd3300bb3a6e3dfb92402f13cab8b758a5b7c10431a5e6d9a43e6cd7a84f6c680fe4657d0bc7ad8d73c8bebfb4a8c6b38091f5460d04a972938871ec40d9bed3ce89247770b10d5fc1a1c0a243aa69400c28f67d878024c16e12dc1c1fe5ddbc6f1e5180bb6e3ad98e3234b8026b332de6b7a63ecba9a40c81fbbf5039f6398624a756689aadf87d353ef59cf03cd75012c83e07b278a4d6ea72b2d1f379d8f2148ac6981dc3de695a4d657107e3d725b35ec7d216373"}, {0xc0, 0x88, 0x7, "ffa4c5e674b3b9f48b00be669495e782ad22f15e380e222d0ac8f8f88c93dd8b7de771aa41e65982fc3c633433d46f115237538b8a87e1702cdba596562b224ed41613d829e58e7a5fe35b5270864917cfbe72e87a9db93d2d312e31f0fcf0a9401d8db3914af492363fa53225d91dd497e36d8a75fe7d0fdc89121adb848813bf2979531708f30a97cdae57ed24790934525c0f98e6a0f46084a57b736a75ddedd14ca206a56e0ad7e59b79"}, {0xe8, 0x8b2afa7144685922, 0xffffffffffffff96, "c1d2ebd277d9834a580de3e5bb51f4e2831d307e39ed098b52d0bd66748b27c62d2409d3c5ebdac55355ba8f765bf1705d0dc2a5381758e38671e094af7ca8cbc4ad7eaac0b106b6a9ec54e2cd11f7356aa231f4d8bebfa60d9c766e794332e1b7455ff72b7d64ec2f62f694ee574dd5058294132c7fe7e459dc456892140cb0534cd3f11a7b190598960499d724cf48ff29ae5ce56ddc68d6d0af1a96c8296e60725a68ebbea0f713f68911090dcf0cb6d9d4aff38e98d3464d16deaad9e484ab830ba79b6935c8d49a87f941c02bff159eb75874ff2263"}, {0xd8, 0x10e, 0x1, "b212bbfe36dd655e0fb67bc65a186276e226ffdf003969e18fbc6412094dbdb316fd3ba6466ffc50ebcb027d5ee662c3bd1c773db0e2a39eb9dd2d7ce5897b01472bcc6b76d59cd3c9dbcd3c70a543d1525fb067c6ad6a2c2bcdbddc8c3d1f311e0c1f80ff083efc9127c4414760cc1645d332dd9f1d811996a7ee229530b22b6d41958d3a08350d964656f54c97213b86492d6d2da9e8cdab8a80e15cff790325ba32a34ec7934ddab9824e28b8e30764ca106376b10583b9f97749006f6618bf98a109e412a14f"}, {0xb0, 0x114, 0x53cc, "e191564b04ab3f13d5c705426db13a70750a7d88336f61a71548b8de587ab9eda189545f21696a6d9cd1956cc9daa74915353c1351ddd5c5642b7d39385bd2cef4504ed9ac6fb8f38b479467df17a81f1dc61c73d9b1f74949f2efd8f01a103d29dd87c6ea491159e7f87c9e41a48bfdd95cf7b6c1d03814b238d3ee6ba5d5a0c932ac6bb07cc19cf54bbf45bcd58d5497fa0c33d03bc7b372"}, {0xc0, 0x105, 0xed54, "6e181f219e01184b0c61e9758efd7b62401678b4d05beb7b8297c65b05cafdbbe11d13c546445a0e1847f2fc3d883a00dcd3cc5c87c5caf349fb314e052e6f69fff7f37d91860e8bc26a2c5bf2d89bc7894036da0949b3705fc88b1f3dc6b9fdac41037f2d34ed33bf4f8611f44ce0f3028de9db4a995699312255cee7c2f0c5846e5869948ccf73f6d2f3391f59f8f98d39b69cfb44c9af4883b1ec05ec2de7a5fe34c59ed7a1241a73c60846d7"}, {0x58, 0x102, 0xfffffffffffffbff, "f263133352848adccdf476fb7f8b844606fe780ebf2b0a3d58fc9734f7b6a4ae61c3c845112851093e7aeae5a96adbb306274262e776d6daff6c2de5449bd5c6be"}, {0xb8, 0x10a, 0x363f, "180033490f1886b50c547ae3deba7955fcef04882f6b2bf848ca9179fbfb2757f158339925e198392c8761e517a5f5c1d4c5b21e280b45178d19f2fe7a94e44bf352392de02df3b1b05fc30ac264b9ec2bdfec46f199c7be5cbaf361474bdf40ab68fe98b6841caf4944633e0677615a61693854bc7fccc2500206ec0005ccf9e7f9b6a3a9a0453eee3d515fcd5f9c33e9a8d876f319d042fafd9fce5b93e6d2945a24"}, {0x20, 0x1, 0x3, "baa6198dbefb041c54"}, {0x30, 0x115, 0xfffffffffffffffa, "52431b4b6feb46a2b32ca02485d2ce76397825cf5b5d9a772a99"}], 0x640}, 0x0) r5 = semget(0x1, 0x0, 0x4) semctl$IPC_RMID(r5, 0x0, 0x0) 21:00:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d63000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1583.100447][T19476] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$getenv(0x4201, r1, 0x7, &(0x7f00000000c0)) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200680004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01003f00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000012c0)='/selinux/enforce\x00', 0x20804, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f00000011c0)={{0x6, 0x1ff, 0x8001, 0x1ff0000, 0xfdb, 0x5}, 0x8}) r2 = accept$alg(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001200)) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000300000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x2}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}, 0x757b}], 0x1, 0x0, 0x0) [ 1583.463208][T19885] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xad, 0x100) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000011c0)=r2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1583.509784][T19892] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1583.618576][T19888] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) fchdir(r0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) sched_getparam(r1, &(0x7f0000000100)) fchmod(r0, 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1583.674102][T19776] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 21:00:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000007ffffff8004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x101000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r0, r1}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x3c, @loopback, 0x4e24, 0x1, 'fo\x00', 0xbd07cf248bf1317f, 0x7fffffff, 0x28}, 0x2c) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000012c0)="2f0af0e4ffaa3a14a46fa643cbe888af577d4e391b14902c8db040bbb4c116c7a2dd937f56102ee8450aab499aaf64535114309835b56d0683500d6454300cabdcd73f85777f", 0xffffff9d) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000001200)=ANY=[@ANYPTR64=&(0x7f00000013c0)=ANY=[@ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16=r1], @ANYRESHEX=0x0, @ANYRESOCT=r0], 0x31) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1583.879111][T20021] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x290) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1583.973000][T19892] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d7e000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02006c0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000011c0)="bac33fecde0d51a1d0c92b158b81c739803a3ff5bcb83b62eb54f4f045615f3e722252932de8d1032c9061677c8b116506f8da606d05a92e36c20aeb5f828acc59e0453caa760200000000000000279d9a7b0e62838a9a252da3c62d3ad68c8c42f56594f3e3c1ddd2a256ac2a48d03acc4388c10ddf037f655739925d1cb97ef69a2a6c6d7a5600e886e0127505f100000000005fe7571f3a1bc76c9522bde9de68a443aa31590dc6c0d2c6a81055275612f6f6ac5dc7ae67f491fc0b2484a6c3f196cd7743e2003e6e7564503876caa04c5b85267182d89940b83ddbfd", 0xde) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01004000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000400000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000011c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc0800, 0x0) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) [ 1584.479282][T20552] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @bcast, @remote, @bcast, @netrom, @rose, @default, @netrom]}, &(0x7f00000011c0)=0x48, 0x800) recvfrom$ax25(r2, &(0x7f0000001200)=""/140, 0x8c, 0x100, &(0x7f00000012c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) [ 1584.688094][T20663] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1584.716295][ C1] net_ratelimit: 16 callbacks suppressed [ 1584.716301][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1584.727771][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8, 0x12000) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000180)={{0x2, 0x2, 0x4, 0xe99, 'syz0\x00', 0xe729}, 0x1, 0x3, 0x8, r3, 0x1, 0x8, 'syz0\x00', &(0x7f0000000140)=['em1\x00'], 0x4, [], [0x9, 0x400000000000, 0x0, 0x9]}) accept$alg(r0, 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x7ff, 0x8001, 0x5}) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x309, &(0x7f0000000100), 0x2, 0x0, 0xffffffffffffff8b}}], 0x3cd, 0x0, 0x0) [ 1584.746423][T20334] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 21:00:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000007ffffff9004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1584.826554][T20770] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x301000, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x2) [ 1584.943801][T20775] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1584.956284][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1584.962062][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f00000000c0)) 21:00:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d68030000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200740004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'authenc(sha3-256,ctr-camellia-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001200)=ANY=[], 0x13c) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000100)) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000500000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01004800000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SIOCNRDECOBS(r1, 0x89e2) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000007ffffffe004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1585.418927][T21326] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1585.476069][T21455] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$ndb(&(0x7f0000001380)='/dev/nbd#\x00', 0x0, 0x800) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0xfffffffffffffec1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000001300)='trusted.overlay.nlink\x00', &(0x7f0000001340)={'L-', 0x4f82}, 0x28, 0x3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="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", 0x162) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f00000011c0)='mime_type\x00', 0x0) syz_open_dev$admmidi(&(0x7f00000015c0)='/dev/admmidi#\x00', 0x3, 0xc00) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001580)='/dev/dlm-monitor\x00', 0x400000, 0x0) bind$ax25(r3, &(0x7f0000001200)={{0x3, @null, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001280)='/dev/dlm_plock\x00', 0x222180, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, &(0x7f00000012c0)={0x7, 0x6}) keyctl$revoke(0x3, r2) ioctl$KVM_SET_BOOT_CPU_ID(r4, 0xae78, &(0x7f00000013c0)=0x1) [ 1585.606288][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1585.612082][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1585.617878][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1585.623600][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1585.623665][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1585.635050][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000001480)=[{{&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000001380)=[{&(0x7f00000011c0)=""/165, 0xa5}, {&(0x7f0000001280)=""/83, 0x53}, {&(0x7f0000001300)=""/122, 0x7a}], 0x3, &(0x7f00000013c0)=""/189, 0xbd}, 0x8}], 0x1, 0x100, &(0x7f00000014c0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1585.773327][T21330] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x98200, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)=0x1) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000011c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) [ 1586.028658][T21450] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000600000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d73030000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02007a0004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000000ff004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01004c00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = geteuid() syz_mount_image$erofs(&(0x7f0000001240)='erofs\x00', &(0x7f0000001280)='./file1\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000023c0)=[{&(0x7f00000012c0)="7af131d3d07cf2765f1537758e7947de2a6e7bda8e19c6b8f2e2d4367034d14781936fc8cfb823e3783fc0516cc415f1f193cbd34332a7fac1c6b74f972a8f3f385aa91e9618aecf995a1b1e88982e7c7fc872dc36f1b556eb2882a75690f2fbb1dca8e8931b0ce5ca3d1c8783f665739227b7a2e0cbcc829b5a769db5be814aa6675e0ba8337c1196e34139d98414d268ec4657294ca99d1166906c8f3b92c752581eeac931c97e4d6a46052eeccfdeec9bf38ee4ecd9197fd4f6265ab4f0817c10fd318fe67959e1ea44a763b8fa838ed6c34d4751d9ec7cee38b2ce02ba3e1c636bd690c21275868f60cfb97a7e897602a90e5290deedb0941d47030c60f40860541709a9ad809406982b6027b89cab099a850956e249092efc5d0e57c377f096b32ace85c77929ecb3416793fb30d513769948d960d37484a10eebc0d88f6b53753210805c29def3be3b827b5a57c19386e00e2be23fa20c4eacd0738862160032e2b7c469433fe1513c3fcb2e27b10b4801fba411b39f59f7a69ef084c0429bd79fad4ebeff801dde664709d1fa43c660c0a0eff85df379e306ab316dbc06310eb69d82cc5387f218f3660b44b51cdc539c5e277ab0036df9e3a2935e9484b6cb47bd5e66cb46e1913b714acdf20f6205b533688520286729ef6e9842881496809f5c4905f01aa1b1f71c713819f7c17b74d8767aa4106930d6fc1045598b36bc6d9fff33107719e12375ad09edc6554313288dbb87c7bf39a6b8301c02eb64a91d5d43fbce418e30b398a43b289dc70228b4bcf3a6f9122871593ca2005198a864ff9a5c96f1e5c57002036a2ee790abd44361cac1715958283f6129d549f366565c01a14155da81dd261752b3d092dbc1fb7e7c5b251418c1711012b0ba20d317b91e8789f260aa636ab4e175540d6e1ad154487fc5376d7690d7480954ede4f6d94ebe92b80f976b9ed9adec85790d45a752d8b87c09996f835806f592c5c4e6b86a0c45ed1ff47cda0807f0bc3c59ab1289e00125bd7e47f9f39574596d6dade9af791b0469a00373836bab755beda9eb06e61657ab0d4132ae398b7116ac45a6a2f5c80f566e5fc3cbef32f47fc5a15a7819b2e46e3f3cd8662e85fec386d2faa1e79d720b669c5fb3b4abd9afb2f06e362f77bc7941ffb653e2588b089e93eac7317a3659e2e1ecd8c61803fba7faf4de870c2a0e2dc87d62f8728e3ba8b47ef0e15fc80984b94ff8fed4dee37870ad3e4aab7051379034e98e424983bda946c2f7a648d8557f556c40e8c331ba1cf11af2fb0e946f962442434dc9c93f7e9b2d7e27738473eff1eb2f0a9ddacdf322bb8e609f07bb67de273bc4edb75bc5091195189ace46d83ab180b800dac6c08ac91dac9ee4c6936c5fc8498b93db06fad088611e0423c650caedd93ab92e0d9ce20d6d94e76f4c34e04071dc84128b2bb85a6e096f9f744c76645667c5b20a6c2152f935083a11f3216073e9c0c782ffc0435f9376a9b187a5583ee80379ba3b7fc20f049bfbd535a23cc841594e0e3973274a186d705e71ee6cda19077d760a656b41e36730dff23232524fc06946fa28eeff250c32a3768750bec8d24fd0413978a91f01b03de96cfae9398700d5b3a80c8c3aa005cf3570112b0a4cac71653a69f1b9704aafbcf86d92806b95bab74db1e3e0d305719a8e712add749e83e066eff081ccacb3511bc078fd04312af4c4fde33a21e4e17e31da0c56c9785644866dbb2cb290b8e94c623bd9d4f180de1253100c494830474ed51c57faaead5b43504e998b7ab49d99d441c61fb0085c5b75c57c2c530e26e2cdc5eae9c9bade0371d678a2de22cd536cf61b2cab6b74796640192a841519fb121cb0426cd90ce0c1681c12bda2a41c19b2ac56b0636ab59bc678a59f6e58a04db1242f023a15208a7ef626afa30daa79def0c64c2419002e7a9852c7f4aae16426d11461c3be13dbd36d65480a09a50d4e824fa44a7229d6eab4869e10f09d17d499eb786e0ce320c8057ca0bc2318c89d33a8df973896b49f4b9b5236888211718d276589983f5adbf10d9c82d49201006686291c73c2c5b7f90685fcab4ff09f5b7574de693e6f6d3572b218cb0d7424901372bf183c2cb6948232e6242934256c93f1e39bd00d61a57be06d738b9b9ee6967849dada6ac4d30d7b6c9fcca3711c9412d3c3eabc14cd3894323561a6bb7c46afd2cb741c0ca5be7b18d44d0b6dd0e2ec363592250525e0bdf074e2459db08b4966aa9542e06c40d80d6d92f5536bdb634d4677222faee8f2d34f9812293636ba2df36f8e93ee959afb1a7100e1a3a3d0b8456cf96483d363ba160a554de79997618301736f491616d0af62e4f552fb09e0c93438db86b05bd3b22c66582de7fab2e2332d383676da11ab90f2e2a4b01fe9fca4d897077c7b4568bad46031f66d60b1873e7fe823b112092551cad2b5566b56ec6be5b9aa436f68a63929265b4b278775caaa0d3b42e788dc387e703c85d7f9812de527de32eede92bcb590024da8304cb3ee35aaed7afbe4b57913851959afcacaec9080c0cc876044a1764dbf0797c0cef736b11a1363106efc84f59cf358382f49be357664653688e541c262cb4988a2324f6e10043e49ff9c975e38a5aafbe4db6ce7f476a741d4bc721ce3c0a9bb3d9e5c01f618b51d5dfd13fff1983164460636ccb7674f86671b0d4f0e4531acad138e07e87db5282705905372a341456a8f8106b8bbecc914914b025e739565fbb181251eb374ffde8b872f210fd26cb2235fe51ae7bb256ee2a8f0d439ea2b1f71e9ce702527cde1a67593b92c748d5aabe5312ebbb71673d3197700c9942cd7206b57bb340d807ad2159fca570aa73ed026aef76500517a6b2750d3be6ead2179817a15bb70f00449dcf68ce6e88a28a5fcd12dc20dfde51cff3ca18d1b7582c4f2167c6b1c77ffa017ea2b2846072d0369e8cae520d734fe10f7b4b52f85efc3cbf11c9b8e9a5bf57833a5fe9b56ea48ae2fdb848fdae7e53210a7137f14bfb7e8e85494424bb3f05185efa7aa65d00ad6f0332c7a5bd9d943c2d2bc0c4e70ebc5b1e58cb45bf337fdfa8643d757b2d2f34bf85c5ffac6d791d9ba1d398326d7d05a14254de21d806caf50a5ebb795a99973f96e4b872915c2425d147e61ffa0b9f9e13458bc06128679a91aa5e38fa3454d8887307c1bc93f0cf43d2ee7fca3c2fb01de1d9b0cc5cf2357c9fecc085dd0c62b6e6173d8a7ba0f51ac8b38e0754700bfa3f5f2331e1c4739d063474529f5fcbf7e76455035404a573e6d260a11c9ade337e85ec7b7d256a7f779875a3c6e3685e51255a126fc6212b29e10b13b3fabcf53c25856a43a95ceae375d6b16a2fee0fa2e4a4fecf7c6dbd64b4f441ff29ca9d7694553fa6b4c6a57de49014f37a8b4dbf587ec293e108c8668785c06bcf103973ce8585dcfe0b62af53c972f213c164bc23d4035fa60c5cfcc7a890140045037a65e975e36c97e64181d5f93bec5d0bb67229e909c506ff9602856f1aa8f8cae8ba8843c14b3da8f79c568366d716031bac0d7146294bedbc753f71daa2dca3eb05882ab1cb1b0358398777daa7ab6eea7322d57c82e96ec2ff97d8a83ef79a06e40ff60d7dc1f24193e5c3f5b61e77bc864d5dc0ef18123fb83b92ff76622e64b58ebc5c8fa76cbcbc8d2ef43f8689b4e5c32e12ed21f3b2450a7c5932a6a92658c28b7c5c6ba1d5adde1d7ea3611cfa43cc47ef40d543d5c59d6ec90b7ba50ea32942be283acc36074f541f0205eb6d54e6252370dd986cc600df366b414d053f52803136a38d28e957cc5ef86d6236e70e668548496e6b0e40063203dd7a4e51e32b9689f5f6126b6c238311c89e0118d44c96fdedcfe79d8d5477b125913061a13ef158cf81a5f31332de2debc060a6582c8fee66fe7dde9b02ee752fd158daef7d50ee9d896327925eb69a38a2939762f1385d7cfe9b9a97047d7bea004d0c4b3990619d382a4c4a317fd7c5ec5279755c1a235f09e8619de15383c964037ce775b55b80b27078b26fe7d80ed536367212ad2bd38a4b2c76c94eb44d686375a210104859c1e082dae788cbf98cc063e33e2c6177345553a5229d8a9da07c2d85ae0c52edeb785a182cce94f3530963b68d47539c11aea6b85bfeed45747159c0634a8de05530d279d7c29eb9a2626f51b2465261cd6e33fd1bb71bed9987cc51520fe2332cd441bfaa261013806ee350a2a7f4475aab16bd5b5d4daf3f3266488af16d935ba477a280df02fee4f9af34351ffa2136092bb38ef1ee575f8ef62c252a8b51165247419d16afe9dc053cee3f236d4b9a410bc7b66efb9da3088d0d566dc043ce807183d2e0ca87a07266e5550ea761233aafab54ea78a2bea6eabd369747dc46a63ee4f4b87996e51000fe3d9f01493d27affa9d02b47bf9dabe5123edc82f3bb3d2944160fa1337db864b1ea2f9b72cb1786b73167065f060d059e0bbee63b8c83b279ad8ac025a26b98b469d24752da3a3ed17a320c358188810131ceec058ce3bd5ac8b7576fa5a3477e3406c81a29a4b5ed30a6947dffb24face1eb204377b3c517bbf2828e7dd44043092e52618f261a088b591b5222388260edad2c08d61fa7acc6d53391c84288b7bfbcf060021b556e8ec104004244c2f657bb3875a1f60f812775f409e468d5ca17d63f9bc14a24d73a0e42a283de85874c919536df5bd3f5ac83799aecbecc9a4444b902b6c0dc60b84166bb8122395e6adce3907265dd28972c6390354ff174d250e465a253131c379e84affbfff8e4f2c3c9aac64ca0ea1274b671f814dbf99815ab6cac65ad701cd5b0a603426cfeb804021d168fbb9db5aec6cb869e62c74140af84c2a562c8b2ea20005c70e3f30922de6e5a65613c4efa1f5f99e8a9abd3ee0691b7534f51450d8ddda7ffc54983baa3e62257532e79f03f61843ee63273f95e6599b106eeef65cc8951562f2109380d0ae631a9e7f2da8f4ce85ea057d6276f46f241a5669b9a2c7aa76548bd5f9ec1446e2ab8d197795b2b27385fe75c7ed80f59e1c7cbf3e64f8d85a97ef6c93b090cdfdd45c6393b464891b8e9af07900740e74a3088ca87766cc051477cb01e7a744a30e8e950e830b55674668b5e0def43232d9dcd467da15b7f9811431d87614a89166ce587353c4402c9e3ea1bc67c6dba83c707dacc4fe6fac8e941d69c529374c5a2dc7dc450b8cd7297bce92f1736c8114509443fd9b0393271cc3bbe0519e7b0f5ad4f4b5971016b54bde41db5b1e8590e316796babd0a7efbe88756e1c2cee0986661e7400b960bb1af781f2c6efda80e85967f4f456e8addf2f15934ebe94c2ab479af8a6ef5e90a98f3508ae74525022319fe1011d46960d126c22cfb29b09c6d1df20ad21deee47cc427b8ebe82417e9772bf75bde77e441d27cc24fc31ef883be7575cd62c6ec88251c9c9833fae5d020558d69801419d75d3398de5f8ff7f75dfd193fae48080639a17e7d909f9e77ab54e973f9186bbd469682913933afc4433b8685c45563291a5c232394aeeea6f3c9d8bf2388512f7cb1fd5bc98e79748a53663ba5c6632e868f9f085450255a1ee380d1da07d00298ccbf899ca639dd35a7d00fff2ba7431d2024a76dfbcd2c4cd4fb5571fa504680adc77cfd884320a61e08b2d1e67794fe33c38e277c51b53b118d444e020a6ab47b3d43feb946c4335c4bd6e3d0511e32a1def7914c14dc9f9aafe6dfd8dd14bad2bee54ca661511e385ea9fa7e1434bf", 0x1000, 0x3}, {&(0x7f00000022c0)="7babd0b1d1e2386736670ddb433b5291d9b78c7c9ac4a9583a31e25c00c90ce7e88affc62391e7f5c0322783c9dce1d7abb0a175c8216bf0ffcc798b2004f592918a78c0a5f60568a5fbe5eda7497036f0078010ab5900c73c1fa6db7201fea2aa92c80c2f424b2c6423680300d97427e23a1269780d3758bf84f1e5a6fa1643fb01bf278dec43134c0004e9393d3a76424f98d64640922e108810e3b63973805ad70350a7106ec4cb7f6aadbedae055628818fd1e54e56b0dfc1b8200c58f1eedf504027bba274e3150c73754c958ce7a8bca5bb6e6bef399cbb2055543c28b030d", 0xe2, 0x8}], 0x800018, &(0x7f0000002400)={[{@fault_injection={'fault_injection', 0x3d, 0x8}}, {@fault_injection={'fault_injection', 0x3d, 0x3}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'skcipher\x00'}}, {@pcr={'pcr', 0x3d, 0x2e}}, {@fowner_gt={'fowner>', r1}}, {@fsname={'fsname', 0x3d, 'cbc(twofish-generic)\x00'}}, {@appraise_type='appraise_type=imasig'}, {@fsname={'fsname'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, 'cbc(twofish-generic)\x00'}}]}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0xfffffda5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = dup(r0) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x1) r5 = getegid() chown(&(0x7f00000000c0)='./file0\x00', r3, r5) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1586.333553][T21931] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1586.354174][T22002] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x4100) bind$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10) 21:00:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000700000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01006800000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000011c0)='/selinux/enforce\x00', 0x141400, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10010, r1, 0x0) r3 = semget$private(0x0, 0x1, 0x30) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) semtimedop(r3, &(0x7f0000001200)=[{0x0, 0x2be, 0x1000}, {0x1, 0xd8c, 0x58fb75a9f01fdeec}, {0x1, 0xc0, 0x1800}, {0x1, 0x10000}, {0x1, 0x0, 0x390b6b28bc3ceee7}, {0x2, 0x6, 0x800}], 0x6, &(0x7f0000001280)={r4, r5+30000000}) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1586.578475][T22012] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x40, 0x10000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000001440)='nbd\x00') r3 = syz_open_dev$sndpcmc(&(0x7f0000001200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x100) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000001, 0x40010, r3, 0x10000000) pipe2(&(0x7f0000001240)={0xffffffffffffffff}, 0x4000) r5 = syz_open_dev$usbmon(&(0x7f0000001280)='/dev/usbmon#\x00', 0x6, 0x22000) r6 = syz_open_dev$adsp(&(0x7f00000012c0)='/dev/adsp#\x00', 0x1, 0x40) r7 = syz_open_dev$dspn(&(0x7f0000001300)='/dev/dsp#\x00', 0x8, 0x2000) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000001400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001340)={0x48, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8815}, 0x8000) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r8 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r8, &(0x7f0000000600)=ANY=[], 0x5c) recvmmsg(r8, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1586.836868][T22016] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r0, r1, 0x80000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) write$P9_RGETLOCK(r2, &(0x7f00000011c0)={0x27, 0x37, 0x2, {0x1, 0x3, 0x7ff, r3, 0x9, 'skcipher\x00'}}, 0x27) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000023c0)=ANY=[@ANYRES64=r1, @ANYRES32=r0, @ANYPTR=&(0x7f00000011c0)=ANY=[@ANYRESOCT=r0, @ANYRES32, @ANYBLOB="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", @ANYBLOB="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", @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR64, @ANYRESDEC=0x0, @ANYRESHEX=r0, @ANYPTR, @ANYPTR64], @ANYRESDEC=r0, @ANYRES16=r0, @ANYRESOCT=0x0], @ANYRESOCT=r0], 0x212) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1586.960043][T22206] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1587.056165][T22240] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d00a80000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020000007fffffff004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000800000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000304000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001240)="ab553fec94248c32e27d04003c00288a", 0x2bcbf6b8124268c3) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000011c0)=0x8) accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000001280)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}}, 0x8002, 0xfffffffeffffffff}, &(0x7f0000001340)=0x90) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x187df25f720444fe, 0x12) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x200) pipe(&(0x7f00000011c0)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000001200)) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1587.357942][T22666] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1587.421350][T22675] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1587.435433][ T26] audit: type=1800 audit(1567371625.329:235): pid=22776 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17164 res=0 21:00:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01006c00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = shmget(0x1, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1587.482612][T22778] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x8, 0x0) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x82, 0x4, 0x3}, 0xfffffffffffffff7}}, 0x18) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1587.606846][T22781] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x1) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000100)={0x4, 0x1, 0x9}) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r2 = syz_open_dev$radio(&(0x7f0000001240)='/dev/radio#\x00', 0x3, 0x2) sendto(r2, &(0x7f0000001280)="fdc9504f562741d9c5ba30b20cfe98b09d4ae9bbe2666e05607f373a385c01a7e929380bfafb0ff7878226c28aebe25d339072f1e53088a548154da572de34af83736f17779adda70d55ac603ee6a17637ffbc07d208c2e29e74336e5e6abddcbce71b2410dae520d2cd965df193e537f134fd7cb7abfaef64efa4087472fbef7a7ed9ec0e81969d36ffe7681a23f518e2ac280e865a9ab2dd8e61fe660d59a8f55d16066c39dd9e8566fe2cdbd66ecbf17892d8febf0e4f22a408beb585689ba01a8dce1b782ba0617225eadba6b7b8a35282b64646415c4fb4f691f7cc07fea80e7330d172759b56c272cd87", 0xed, 0x40080, &(0x7f0000001380)=@nl=@proc={0x10, 0x0, 0x25dfdbfe}, 0x80) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000001200)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) read$rfkill(r1, &(0x7f00000011c0), 0x8) recvmmsg(r3, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r1, @ANYRESOCT=0x0, @ANYRESDEC=r0], 0xfffffffffffffcd0) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000020001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1587.927536][T22893] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1588.079767][T22781] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d00ff0000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553f00288a00000057ec0000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2000, 0x0) io_uring_enter(r2, 0xfffffffffffffffe, 0x1f, 0x3, &(0x7f0000000100)={0x3}, 0x8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000900000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000504000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01007400000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xc6) getsockopt$sock_int(r1, 0x1, 0x29, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 1588.424286][T23329] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1588.448689][T23333] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1588.461623][T23331] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1588.476797][T23438] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101040, 0x0) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000100)) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f00000011c0)='net/dev\x00') accept$alg(r4, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0xfffffffffffffd37) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000030001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004df2ffff7f000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/8, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0), 0x0, 0x0, 0x0) 21:00:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000a00000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) fsetxattr$security_capability(r1, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0xffff, 0x2}, {0xf3, 0x1}]}, 0x14, 0x1) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01007a00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = dup3(r1, r1, 0x80000) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f00000011c0)={'teql0\x00', 0x6, 0x3}) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1588.939399][T23761] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000604000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000000c0)) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x40000, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1589.269834][T23882] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x42800, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001240)=@mangle={'mangle\x00', 0x1f, 0x6, 0x638, 0x0, 0x130, 0x370, 0x130, 0x130, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x6, &(0x7f00000011c0), {[{{@ip={@multicast2, @local, 0x0, 0xffffffff, 'veth1_to_bridge\x00', 'irlan0\x00', {0xff}, {0xff}, 0x33, 0x1, 0x3}, 0x0, 0x108, 0x130, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0xffffffff, 0x80}}, @common=@set={0x40, 'set\x00', 0x0, {{0x7, [0x19e3d8d8, 0xb24, 0x2, 0x800, 0x9], 0x100000000, 0x1}}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xff000000, 'nlmon0\x00', 'rose0\x00', {}, {0xff}, 0x84, 0x2, 0x41}, 0x0, 0x100, 0x128, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @common=@set={0x40, 'set\x00', 0x0, {{0x4, [0x8001, 0x8, 0x514f6022, 0xff, 0x2c37, 0x2], 0x8001, 0x1b}}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x7}}}, {{@ip={@broadcast, @multicast1, 0xffffffff, 0xffffff00, 'ifb0\x00', 'vcan0\x00', {}, {0xff}, 0xff, 0x3, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x404, 0x40, 0x1, 0x1}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x400, 0x7}}}, {{@ip={@empty, @local, 0xff000000, 0x0, 'veth1_to_bridge\x00', 'caif0\x00', {}, {}, 0xff, 0x0, 0x5}, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xc}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x8, 0x20, 0x1, 0x1}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x1}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x5e, 0x2, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x698) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x2c}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)={0x1f, 0x1f, 0x1, 0x0, 0x0, [{r1, 0x0, 0x3}]}) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000001, 0x2) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) [ 1589.466797][T23984] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1589.548586][T23761] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000040001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1589.607895][T23861] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop1 [ 1589.638306][T24305] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1589.756297][ C0] net_ratelimit: 14 callbacks suppressed [ 1589.756302][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1589.767804][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1589.773552][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1589.779284][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1589.785024][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1589.790759][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004df8ffff7f000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000b00000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000100)={0x7ff, 'syz0\x00'}) 21:00:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01c0ed00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000011c0)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/189, 0xbd}, {&(0x7f0000002300)=""/70, 0x46}, {&(0x7f0000002380)=""/93, 0x5d}], 0x4, &(0x7f0000002f00)=""/4096, 0x1000}, 0x719}, {{&(0x7f0000002400)=@ax25={{0x3, @default}, [@default, @netrom, @remote, @netrom, @default, @remote, @netrom, @rose]}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002480)=""/176, 0xb0}, {&(0x7f0000002540)=""/182, 0xb6}, {&(0x7f0000002600)=""/177, 0xb1}], 0x3, &(0x7f0000002700)=""/65, 0x41}, 0x9}, {{&(0x7f0000002780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002800)=""/67, 0x43}, {&(0x7f0000002880)=""/238, 0xee}, {&(0x7f0000002980)=""/49, 0x31}, {&(0x7f00000029c0)=""/184, 0xb8}], 0x4, &(0x7f0000003f00)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000004f00)=[{&(0x7f0000002ac0)=""/169, 0xa9}, {&(0x7f0000002b80)=""/10, 0xa}, {&(0x7f0000002bc0)=""/192, 0xc0}, {&(0x7f0000002c80)=""/6, 0x6}, {&(0x7f0000002cc0)=""/247, 0xf7}, {&(0x7f0000002dc0)=""/247, 0xf7}], 0x6, &(0x7f0000004f80)=""/131, 0x83}, 0x4}], 0x4, 0x60, &(0x7f0000005140)) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000005180)='/dev/admmidi#\x00', 0x400, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000005240)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000005280)) ioctl$SIOCRSGCAUSE(r2, 0x89e0, &(0x7f0000005200)) write$FUSE_NOTIFY_STORE(r2, &(0x7f00000051c0)=ANY=[@ANYBLOB="300000000400000000000000000000000300000000000000010000000000000008000000000000000000000000100000"], 0x30) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000000c0)={'team0\x00', {0x2, 0x4e22, @loopback}}) 21:00:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000704000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x70f) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x3b) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1590.170619][T24533] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000050001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1590.333106][T24747] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:28 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x8, 0x1, 0x3ff}, &(0x7f0000001200)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000001240)={r1, 0xfffffffffffffffd}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0xfd75}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x24}, 0x100000}], 0x1, 0x0, 0x0) 21:00:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000001000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1590.436989][T24750] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1590.472303][T24748] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x200000) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000011c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0x2ef) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1590.537088][T24857] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 [ 1590.554211][T24747] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000011c0)={0x100000000, 0xf8, "daef179257f949b6a7a779c688f44de42da080873844fd36da5be7eca704dc0e20775b3803a06069a7feac796fcbc00341034867ed62a589cf3588ccc2422463f86c2a8a3557f2d0f206da2019dcd7f56aa987896d256f90dd5e9086aaa1186757bf9cddeea3be18d1fd8993e63647f6ae4148218dcb196fddb57a4f338bc9f2dfcc18c02819e1890f8e0ced59575a3597e1e7ee0ca043fbb7b2f116ab5be5cee71488d196fdf59c24cce59886a97eca680b87d7de77e48d46fd294f7050a1bf28a36809d47c38e4d1807f4b87d821485c4b22e92d8585055d8dd42d8954da521f5424b502ebb992aadd3de3af26b76273116422afd39a6a"}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x46000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x2}, &(0x7f00000012c0)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000001300)={r3, @in6={{0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x84) 21:00:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004df9ffff7f000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/mixer\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x5b}, &(0x7f0000001200)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000001240)={r3, 0x200}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) [ 1590.956281][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1590.962046][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100ff00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1591.012661][T24883] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x20000) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000100)=0x1) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000060001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1591.196291][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1591.196674][T24857] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1591.202055][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1591.273689][T24750] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000904000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40, 0x800) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x21b, &(0x7f0000001140)=[{&(0x7f00000000c0)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1591.469621][T25199] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000002000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1591.539635][T25530] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1591.552636][T25310] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1) 21:00:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000016c0)={&(0x7f00000011c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001240)=""/131, 0x83}, {&(0x7f0000001300)=""/198, 0xc6}, {&(0x7f0000001400)=""/246, 0xf6}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f00000015c0)=""/3, 0x3}], 0x6, &(0x7f0000001680)=""/16, 0x10}, 0x1) setsockopt$inet_udp_int(r2, 0x11, 0x66, &(0x7f00000017c0)=0x7, 0x4) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000001700)={0x18, "d6bede295a1e81c89b1be2a0e521f4f3120f100ea7322d17cf0f25d1e78bc78cb73a326f316a2dbd48c585cd49305330120d9eb555dcc1e1959bc2f04882f00d523899e65c06fe38ada2a32a716c69633e5a854a9d601a465129bb35af011c41311e1ea3a560ab4451a1b2d7ad997e3fb5ade3d8e5c41327f8c5fb9aba78adad"}) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0xfffffffffffffec4, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x1000000000000297}}], 0x1, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000000c0)) 21:00:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010fff00000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d1fffffff000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000100)=0x3000) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) fcntl$getown(r1, 0x9) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000012c0)={0x0, 0xc8, &(0x7f00000011c0)=[@in6={0xa, 0x4e23, 0x5, @ipv4={[], [], @loopback}, 0x9}, @in6={0xa, 0x4e23, 0xffffffff, @loopback, 0x4}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0xcb, @rand_addr="c9374c987b073d506b1230bfabe31222"}, @in6={0xa, 0x4e20, 0x2, @rand_addr="b9aabe2efe8782f25c8753af578bb6f3", 0x1f}, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, @in6={0xa, 0x4e22, 0x7ff, @empty, 0x80000000000}, @in={0x2, 0x4e20, @local}]}, &(0x7f0000001300)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001340)={r3, 0x1000, "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"}, &(0x7f0000002380)=0x1008) 21:00:29 executing program 0: sched_yield() r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r0, r1, 0x80000) accept$netrom(r2, &(0x7f00000000c0)={{0x3, @default}, [@rose, @bcast, @default, @rose, @rose, @default, @bcast, @bcast]}, &(0x7f00000011c0)=0x48) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1592.008860][T25638] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000070001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1592.095047][T25423] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1592.128610][T25770] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x208400, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f00000011c0)={&(0x7f0000ffe000/0x2000)=nil, 0xffff, 0x4, 0xb2, &(0x7f0000ffd000/0x3000)=nil, 0x9}) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1592.300210][T25530] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000a04000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) signalfd4(r0, &(0x7f00000000c0)={0xffffffff}, 0x8, 0x800) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 21:00:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000102000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000004000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1592.468620][T26075] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(cryptd(lrw-cast6-avx),sha1-ce)\x00'}, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1592.726963][T26316] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1592.756807][T26419] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x10106, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000001380)=""/183) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000100)) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000011c0)={0x0}, &(0x7f0000001200)=0x8) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') exit(0x0) write$FUSE_ENTRY(r4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000001240)={r3, 0x9}, &(0x7f0000001280)=0x8) [ 1592.770522][T26309] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1592.808244][T26075] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01020000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000080001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000003f00000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01a00080000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1593.281265][T26653] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000b04000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1593.531968][T26668] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1593.631411][T26653] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = dup2(r0, r0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000001480)={0x7ff, 0x3, 0xb2}) r2 = accept$alg(r0, 0x0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x4800, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000001440)={0xa8, 0x0, &(0x7f0000001340)=[@increfs={0x40046304, 0x1}, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000011c0)={@ptr={0x70742a85, 0x0, &(0x7f0000000100)=""/18, 0x12, 0x2, 0x1}, @flat=@binder={0x73622a85, 0x100, 0x3}, @flat=@handle={0x73682a85, 0x87c4be7bdbabf173}}, &(0x7f0000001240)={0x0, 0x28, 0x40}}, 0x40}, @transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f0000001280)={@flat=@handle={0x73682a85, 0x1, 0x3}, @fd={0x66642a85, 0x0, r2}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000001300)={0x0, 0x18, 0x30}}, 0x1400}, @increfs={0x40046304, 0x1}], 0x35, 0x0, &(0x7f0000001400)="fefc3eac5289ba8c5671fe263d9d78786d52d1b54a292d8f41adf422dfbfe177b20f4b2f260da5553a77e39f39fce8be8d7bb0e067"}) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01030000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:31 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000011c0)={0x1, 0xff, 0x9, 0x0, 0x0, [], [], [], 0x100, 0xa56}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2e1, 0x0, 0xfffffffffffffd59}}], 0x1, 0x0, 0x0) [ 1593.777532][T26679] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000090001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) mount$9p_rdma(&(0x7f0000001300)='127.0.0.1\x00', &(0x7f0000001340)='./file0\x00', &(0x7f0000001380)='9p\x00', 0x200006, &(0x7f0000001500)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x4800000000000}}, {@timeout={'timeout', 0x3d, 0x273}}, {@sq={'sq', 0x3d, 0x1}}, {@rq={'rq', 0x3d, 0x9}}], [{@pcr={'pcr', 0x3d, 0xd}}, {@euid_gt={'euid>', r1}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) bind$alg(r0, &(0x7f00000016c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r2 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000001200)={r3, 0x7}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001240)={r3, 0x1c, "31ae3e10a997019edd48a6b70d5e169853d3e61e0ffb72fb54658914"}, &(0x7f0000001280)=0x24) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$IMCLEAR_L2(r4, 0x80044946, &(0x7f0000001600)=0x400) io_uring_register$IORING_UNREGISTER_FILES(r4, 0x3, 0x0, 0x0) ioctl$TIOCLINUX7(r4, 0x541c, &(0x7f00000012c0)={0x7, 0x3}) r5 = accept$alg(r0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000004000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1593.962858][T26687] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0x2000) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x400, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000001300)=@ccm_128={{0x304}, "4e260c7737414589", "6b297d94ac7623fcf2bdcfad79d61fa6", "9dd35e10", "456aa2f04a67eec8"}, 0x259) accept$alg(r0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f00000012c0)={0xa, 0x6, 0x9, 0x9, 'syz0\x00', 0x5}) ioctl$sock_ifreq(r0, 0xa85648f8d961b6c5, &(0x7f00000000c0)={'bond_slave_0\x00', @ifru_ivalue=0xfff}) shmdt(r1) r3 = accept$alg(r0, 0x0, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000001240)=0x1, 0x123) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000001200)) write$binfmt_script(r3, &(0x7f00000011c0)=ANY=[@ANYRESHEX, @ANYRESHEX=r0, @ANYRES64=r0], 0x100a2) recvmmsg(r3, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) lseek(r2, 0x0, 0x1c7323be3e0033d5) 21:00:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000010000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1594.172427][T26902] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1594.403621][T27023] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) fadvise64(r0, 0x0, 0x8, 0x5) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001140)='/dev/zero\x00', 0x400180, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000001280)={0x18, 0x1, 0x0, {0x2}}, 0x18) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000011c0)=@v1={0x1000000, [{0x63, 0x3}]}, 0xc, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="ab553fec94248c32d17d040800001c8a0b67bf6fdbcf0f0000da", 0xfffffd95) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000001200), &(0x7f0000001240)=0x30) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[], 0x0) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001180)=""/44, 0x1a1}, {&(0x7f0000000140)=""/4096, 0x1395}], 0x2}}], 0x1, 0x0, 0x0) 21:00:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200201004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x80000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000100)=0x17, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1594.566666][T27242] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000004800000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01040000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000a0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000020000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xfffffffffffffffd, 0x48100) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x400}, &(0x7f00000011c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000001200)={r3, @in6={{0xa, 0x4e24, 0x5, @empty, 0x7}}, 0x2, 0x3}, &(0x7f00000012c0)=0x90) [ 1594.821578][T27576] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1594.912408][T27582] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1594.999611][T27695] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1595.024004][T27697] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) poll(&(0x7f00000011c0)=[{r1, 0x1}], 0x1, 0x683) mq_open(&(0x7f00000000c0)='\x00', 0x1, 0x61, &(0x7f0000000100)={0xff, 0x0, 0x9, 0x9, 0x5, 0x3ff, 0x8, 0x81}) [ 1595.116324][ C1] net_ratelimit: 16 callbacks suppressed [ 1595.116330][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1595.127863][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x501180, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200002004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x708a, 0x400000) name_to_handle_at(r2, &(0x7f0000000100)='./file0\x00', &(0x7f00000011c0)={0x1008, 0x200, "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"}, &(0x7f0000002200), 0x1000) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000002240)=0x1, 0x4) 21:00:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000004c00000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1595.356289][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1595.362225][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1595.372022][T27699] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000000b0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01050000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getpeername$tipc(r1, &(0x7f0000000100)=@name, &(0x7f00000011c0)=0x10) r2 = accept$alg(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001340)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000015c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x400400}, 0xc, &(0x7f0000001580)={&(0x7f0000001380)=@newtaction={0x1f8, 0x30, 0x11, 0x70bd27, 0x25dfdbfe, {}, [{0x70, 0x1, @m_ipt={0x6c, 0x16, {{0x8, 0x1, 'ipt\x00'}, {0x14, 0x2, [@TCA_IPT_INDEX={0x8, 0x3, 0x1}, @TCA_IPT_INDEX={0x8, 0x3, 0x3}]}, {0x48, 0x6, "e8a814bb2703c7795c33f67898bcfcd4e1800d929de74fdac132c19bf282f6046e496edbcabeeb0e8d55271dd295c4326da0d998a4efcfd10b6cd2edb5963371ef3c1a1a"}}}}, {0x128, 0x1, @m_ife={0x124, 0x0, {{0x8, 0x1, 'ife\x00'}, {0xb0, 0x2, [@TCA_IFE_SMAC={0xc, 0x4, @dev={[], 0x21}}, @TCA_IFE_TYPE={0x8, 0x5, 0x7fff}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x3, 0x2, 0x8, 0x80000000}}}, @TCA_IFE_SMAC={0xc, 0x4, @local}, @TCA_IFE_DMAC={0xc}, @TCA_IFE_METALST={0x38, 0x6, [@IFE_META_PRIO={0x8, 0x3, @val=0x7fffffff}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x8}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_TCINDEX={0x8, 0x5, @val=0x8}, @IFE_META_PRIO={0x8}, @IFE_META_PRIO={0x8, 0x3, @val=0x2}, @IFE_META_PRIO={0x4, 0x3, @void}]}, @TCA_IFE_METALST={0x2c, 0x6, [@IFE_META_PRIO={0x8, 0x3, @val=0x401}, @IFE_META_PRIO={0x8, 0x3, @val=0x2}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x401}]}]}, {0x64, 0x6, "b997762c661ae5799f5bba651dba45af5a1b8867f497f60705159734e27d2a32d372d26b6dbbe6e174979a94e6458f8c6b9e66ad604ab5d229dcfcd887eebc68d5ed530551e9169bd820e05b77b5b4d8bb9b66c0edb0d6c5809ce0a0cb56e4"}}}}, {0x4c, 0x1, @m_mirred={0x48, 0x1d, {{0xc, 0x1, 'mirred\x00'}, {0x24, 0x2, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xfff, 0x2, 0x0, 0x1f}, 0x4, r3}}}, {0x10, 0x6, "b036767955d5068c5b641f"}}}}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) write$binfmt_script(r2, &(0x7f0000001300)=ANY=[@ANYRESDEC=r0, @ANYPTR64], 0x1c) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1595.513124][T28135] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000030000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000011c0)='/dev/vcsa#\x00', 0x6, 0x100) bind$vsock_dgram(r1, &(0x7f0000001200)={0x28, 0x0, 0x2711, @host}, 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000001240)=""/52, &(0x7f0000001280)=0x34) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40000, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f0000000100)=@srh={0x0, 0x6, 0x4, 0x3, 0x3, 0x30, 0x3, [@local, @loopback, @rand_addr="7c6891e7f98ac7cf618475d3d48ccd88"]}, 0x38) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f00000012c0)={0xdb31, 0x0, 0x2, 0x1}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000001300)={r4, 0x100000001}) [ 1595.719334][T28228] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1595.769877][T28251] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 21:00:33 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000011c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x7f, 0x80, 0xa52, 0x1, 0x9, 0x80, "582d6eba0f1b450156f983e74d668078b413d43c5479b980af92af193f92d8c37f53270626340091ddc3f202cb6c585280a02936adb7d75580f0dc7fc5eced7a07ee52468e49c0a2a237d67c969a0a76ff6f67dccb0db68a9b79ba37ef1ef61a72d6f2594c846760579b6b269e9ad315b8288effae9945c37326a49e757615"}, 0x197) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001540)=ANY=[], 0x0) recvmmsg(r2, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1595.819225][T28249] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001280)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0xa) select(0x40, &(0x7f00000000c0)={0x3, 0x100000001, 0x4, 0x4, 0x7fff, 0x1ff, 0x0, 0x7}, &(0x7f0000000100)={0x80, 0x1, 0x5, 0x2, 0x3d6, 0x1, 0x8000, 0x3}, &(0x7f00000011c0)={0x4, 0x100, 0x9, 0x637, 0x1f38, 0x7, 0x5488, 0xffffffffffffff01}, &(0x7f0000001200)={0x77359400}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) socket$caif_stream(0x25, 0x1, 0x5) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000001380), &(0x7f0000001400)=0x60) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xfffffd43, &(0x7f0000001140)=[{&(0x7f0000000000)=""/44, 0x2c}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000001240)={0x6, 0x6, 0x1}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000001180)='/dev/audio\x00', 0x400, 0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000001300)=[r0, r1], 0x2) [ 1595.996328][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1596.002127][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1596.007935][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1596.013668][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1596.019459][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1596.025197][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1596.048706][T28360] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01060000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r1 = socket$kcm(0x29, 0x7, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000060c0)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000061c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006780)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000006880)=0xe8) sendmmsg$sock(r1, &(0x7f0000008380)=[{{&(0x7f0000002b40)=@caif=@rfm={0x25, 0x6, "36b4655b377bbbebd6a4fa900640573c"}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002bc0)="032d46529fe3f33b57b0f381339a7bac606e292e3ac5a507c3f3456cea39770b00dfcb67ab7c533659a60b452380540e7f36b9b8c2a4e520c313778e7dc66d4e43b5a970cdaccf1e2fc2b6dfe2df3eaf0fd2116fbb676ad392c9138e612bf4a68b68f10eead54e1e374d44b35ae4baa8e97218ca9ba10a1ed8ebdf29d95b1ba1537d7dc9615d801a5db8c4a0acabfdae8ca6c39d71f5b54e638936a4e61b0df6b36b8d66e0e68529b19265e0dd93f11fc5079c7ea2bdde08a01af22cd913", 0xbe}, {&(0x7f0000002c80)="bb37c62fe97e19fcd04f0dd1a5acc8a2d0c583b5840b89e1a920fc37d664a3e8925169d0a89679634fb4873de6c27186bb4a7be67e1561b1d3edf8246eeecc9b01667fea09625fdbee6491d70a354c925c8774a671f398ae4ef9c80506ebcb46a06d5b0cdd2ef583d3041de3254147ad3ea2fc655d91e1d087bb382e8c", 0x7d}], 0x2, &(0x7f0000002d40)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x7fffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x40}}, @timestamping={{0x14, 0x1, 0x25, 0xea6}}], 0xa8}}, {{&(0x7f0000002e00)=@llc={0x1a, 0x5, 0x0, 0x40, 0x0, 0x4, @remote}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000004f00)="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", 0x1000}, {&(0x7f0000005f00)="d78d650e85f53c2e9952d0f726c382bed5a02f229cfbdf08be6dc1116f7782cffbd1d6612faac70b96e08c2ab11168c46806b80466e2aa5ea09f3d668d1cba8d9b963ef2da91c4e6c5d71460dc40eeb787d956a3dfd8f670e803d0f87bd39e2a19ef2730f4", 0x65}, {&(0x7f0000005f80)="1c79a0fd701a1f24084bc4a13918d139cb33c8e2e72fe94e4adb94ad937de782c18fa8af95fd87c99c495a16abdc23dcda0251ee5964d40f174a00e5cf64e87f1d7cab6f4f8bb45334befb869ef86d51c676b7112cb84bad9fec427cea39a094be579eeb3ef8b0b13554c64fb558984d652b28eb0760d6501a0a9a97e55a44946ad76a1d5f4480889818090aaf91795f5c3e5e1597b1b0a439f5956a8b15b57f5cc8c58d3fea", 0xa6}], 0x3, &(0x7f0000006040)=[@txtime={{0x18, 0x1, 0x3d, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x1000}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x78}}, {{&(0x7f0000006200)=@xdp={0x2c, 0x1, r2, 0x14}, 0x80, &(0x7f0000006540)=[{&(0x7f0000006280)="b50436a09a20e5295265e6a59938574b887fbe", 0x13}, {&(0x7f00000062c0)="564924363ce9bfc660c261ebdf3d4e873b6f0db8fa38828d46f0f241a5fbd78368b72b38f6aa1edfaae06fe7115a5e33334d130ed97e529a8694646bf46cd056fb49c41589c4", 0x46}, {&(0x7f0000006340)="6ab5969a3552f2bf68a9bfee48ac4df765562f3e2ff0dbe9d2da00c5d9c643a432db551805a497240cb0122c13240ba58751ff78cc11d2293356bfc95976beb932d1801d1ae7050395e95f9f510c5422843bfd", 0x53}, {&(0x7f00000063c0)="9ee7d1e53596c6b877d2d264ddaf69b8cdcac5b92786a17f3a3d755fd0b4b30d6ab64a4c683125806fee928e8f78637f982e77a3023a0535138c369367e69fcea78cbdf2e19aedf80cd4ac52ec578ea58c24d844e8fe52e5441a7e98ab40653aecf0dd4f15e8a57b396879e7835ec7044d0767b99cb90ce4909dc2f10b", 0x7d}, {&(0x7f0000006440)="2e1366201e20bfa189464b57d5eb039c77c0cf4448f38345b51e9dba01acf7203647942a53fd91062bf029733d616554d327f3c498b4b3de8d79845f847b4051cc93bcd9c3df1251f711989e6e0077fa24a4cbb90ae91324a2d851c6593d9ac6343fd4a2ae9af5af6d66bb332e2355a61423188cbb94d970c1be9f0136699c3763b172e57513f286cb4fa923346b2cdff356f9fe9d814466a4ba4ebd9d7d4428106cb604b2d737d6d3008c2ab86801193992a151ac3e82408a098678e8d40dcd57034bd7e782c29d4d1d96e624e046fb0c05a1", 0xd3}], 0x5}}, {{0x0, 0x0, &(0x7f0000006680)=[{&(0x7f00000065c0)="3f3868a1d6ea6d52b2172e4e2a48ed58c5ab04e9ab159c851161afeed611c91eead8426e7e7caa453b389c5b12259d5e474c32ac0317683b0860e84f466d7e156d42db0dfe27be84414f3155ab38b6c8d3a1f1a24617055f99fa11f896c95d7678a8328340acaa1d4c2a008174793e50da6f3ec1c9c88d3ba074d4fc61a097e804da436ad8fb63dbcf04b0b408f3ce824839d7b49ccdfa8253e27c2cec8f3502cb26", 0xa2}], 0x1, &(0x7f00000066c0)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x16c}}, @timestamping={{0x14}}], 0x48}}, {{&(0x7f00000068c0)=@ll={0x11, 0x11, r3, 0x1, 0x10000, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000006a40)=[{&(0x7f0000006940)="8f17c0d25893c03d5ee4e2deead7eb6b4ab6f9c0061ce8d25aa4b5330bda9dd0cd658662b89560b7f716cce6d17992d56e45005cac7950a5", 0x38}, {&(0x7f0000006980)="22e83d72a29125b1d3f2af33d17aaaa3252eeafad64753422b68599a69b28a4c96c92a4e843af05335617fe156dc3307e3afafe3b673d032d75efc07f9878eb411d6e8e30c6605170042e5222994f8dcf35cbe95939eebe7e33fdac5470750bb322017f733fabe116c3d49e6cfd4d2148faca7e00d3218805e7608878deec7d395217fe2c85ec0a4498bf8b1dcbd8822b3a61e11e60eb85115cf15d9d95d80ac937f3be3d79aea605d9d", 0xaa}], 0x2, &(0x7f0000006a80)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x101}}, @mark={{0x14}}], 0x60}}, {{&(0x7f0000006b00)=@nl=@unspec, 0x80, &(0x7f0000006d80)=[{&(0x7f0000006b80)="1fc443d262be68be5a6769f58cffed1c513bdcdc88582fd2ef71487ea39a2cfa6a116b38beb2d5a6a165128d70fe62d031a86e387eb81415f94e86", 0x3b}, {&(0x7f0000006bc0)="5d73451af5f9cfc0353fdf4247b9179079cc86b0457ad27c39fd34f58163d0fb705420ddffaef87878cc274818e165688d6c79b919445e9db9c83dee1cafa16a867531d3ef4a7343f53203635e4c", 0x4e}, {&(0x7f0000006c40)="41fc33e453450ddc001c0054251ae7c36ec5d5fd82526da36cb087e50d2feb2de6da32ae89bd", 0x26}, {&(0x7f0000006c80)="908ff907a88bc83a99e51fbf220156429c107fb8cab97ba44ac4c2287a1a7387a6a056ef127fb2d4c15c7c9830f0eccb696da89775a37e3d64d86e043bf850b5aa6c755eb61aa3a4cdeadf890e2528203ba374cf5a7d2dc032ec1e76a61f7fa83b8a0d4256f05bf6e5176cd5a0ffa0b7ddc607ec5447bc0746862e356884ae1822fdb89f30f57736139e92cf54846e550fb6298d69990970443307a06f084f4cffb19bdb7a55ee5eaf659b1c653dc7f0f7f5fb9e4ba255150954e9d94cc846de528a00ae411d60a438608a92d7340bfec9999b96ff4759", 0xd7}], 0x4, &(0x7f0000006dc0)=[@txtime={{0x18}}], 0x18}}, {{&(0x7f0000006e00)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x3, 0x2, 0x0, {0xa, 0x4e23, 0x2, @mcast2, 0x7}}}, 0x80, &(0x7f00000082c0)=[{&(0x7f0000006e80)="aabc08a32f685b599d5265dbf44e73813d2080be0db95f6e89df30b55a860290f37d949063ebaaddd5abf17d45775152f38515e4482b693609e37ee644096b78620c5f6cd683e8c5842f6c80373ab5e2e6923c888d2e37fa5159231c304ddba37997a8b978998b183a64f6cec4b013226845fa998ef918c25a8c394f2920052e6e9737c548fbe555a9753bfe9bd429348805695fd8c7aab369a627db68713f998b412375950fb6623f749f38789cbf26758ca78b216fe744651771aca4ee914ca798094beb49054d4f6e30e45dba9fb8164d8bedf255b45e2b916d9ef81393812a9c344c87198925c5ab39a930d7", 0xee}, {&(0x7f0000006f80)="0a97a049a2cfdbd8c74ecd7df24119070240fb263d513425168e609518442adef42f4c98616bbfb8e9c7f701354ba76691658e9b0ed660c3aff91779c94cd78e75cf0133d09b32c2e3dadcaa2b5283007d43b55b20bbf82f108c09ae7ea25097222e61c21920f9443dfa26fbdc857aa50f0d57fc14d4d850416ca2ce040f371f11c799a54303f8c0d1da9a4d0215ec916c81f2ea44a38438b84254f3ceeef00df8a55ced693689c978cfb82b5c071552feac89de810335c1acfd", 0xba}, {&(0x7f0000007040)="57570661e222164dec7d692cc8e6f57fe34655aaf52b393a92e5fc04486624db012fdf76ec8db94159bb77ddd7c9eecdffd2c0b6bc943d3e5565f9060bc28c57c2f81d4701721378107f2163f7dcff46e1101593565fe727f559dc86096b2d212ba1a49ad974072506ead0bb16d6ba333998e50bb14521b4444315c6690d03d21a6d0935df81e3cb511ec9716f7db2c784a876b646a6a9c690821a27d360a40b1a0f645eeab7c9a12923e6251f2e1c056d4d0c9fc55ec91d72bd4baa18ee746e5dc39a25ce1a105b835eb780f7c629d09503b4b4a12b845021d9a3b24f1f129e540871a651ca1e537aac67b69e875d5e4651fd6d647ce0d62fbbb836f807f3e13eeea78f8739b7167b558fe4c92d661101d0eeae1a5bbca16527e260fb8d9708a24c8c5044842551fcec7135547287290970c6163c35889f970331b2db739e170187d72a15955be8f2bf0c21e17434ccf04e3a40bc9681cada50f3c19c6f79be6d569dbc1e77cfcf6b5a704e32ae59bf6ed23aade6c5be0c72565900a0739059ec4fe571f9a39bd6126fd483646220975444093e81679a6df017ca031ba0556ef33eb20d578f4978a2684a69f45052e6252212a55910f51ad64e3a7586b547612f4b423cec5ebf34dd2aa713a11a24bf15c35400b46929e6bb460eb198709076a8237984b5d4fc2082e3bd7d8ffa4b64215585b55cacead94caabdf4c04d0600aede742bce279500d073f9b25cf3e3785be4fdb5e6834d8ceecc97fb879732754921e1b648c09fc09a26f9bdfa488fadf534b80d432ec8c8d635a5b4894740761a17696b732a9fbf28617b006b07cfa52c548684b3f4165e1db36c093918d28b23f6af1d63d3e46e48437cbca891ef5d05c30192e858b161b4685fb9b456895bee4d49273ba00717c8ea3330ca8e40902cad06a20537e2f13b0c76e046f0b9e38f728b0bb095dfabec127ac1df1be7367e08d1086d3eb63ed27fef53d422717e88cabdeb1a6036fb05a60a504b41e980f91556f3820d130477f3f01020a5ed3e2d1ff9348297347b0484b87e2f4b37141e1edabf2a5e9b8ca29d0b90de3305667486b36f6d254d13fd32d0dc22dc53734dbb7e3a8a974507bd1c1e11a1d162403bf609cbd0f7ded1eba54d8ec2b168c878fed583e1cc11c0993ed848dc0ce7e3b567db0ad7618242753eeb443be7a587c71784cde75301ce7be19774075fe80e93d4e30dbd6b0a92b4ac9735379f2ad45c12a5ca78207549952aa47849409a92a9911346160daaae4e259db32b3c8092ccb564865dc43f9e1af99c0ea468a5421703d71b37611fd4b1482d58547abcaa32cab248a23160b9fbe0d3173159da548d1bc5f07f3c0d229943cd21012ee1df51c278a3b1d86ca8515ea7aac3dc9ad5cfde8750971ee325734c765473413c4283365d7b9b1d042492cf87d41f84b92b52d02c314e73d73df5ec0600e0311a2b88862c0d80623f246237a856916a3d83be8ff76a9949cc2232652fbf2cc691770490f6be34f9de9918fa57e6fe522710ebf1838a57ddec94a456bb6742287009393b1c37b6c13aceec3232ab9241e754663b4353f57d54d1427494f468ebd743f29189ca900bf7f85e4ba81ecc6a1573f53ec8ed8a17e00f6f8fe89ec1d8ed90c6629f5674dfd680e3f4da27fa6cb29aaa3520d8b0fc84680096fa0816730ed1979e888b104dc03d881d5267702706e0a1e1e7161b86a0a8fd789c7ca821b6df178faeae49319dc28af8fc82788a8acf2d9aeab343b8f03592848f7238046cc683d6808d877a0f1f32ea2cbc452d25ccb40e420d107ac8f1360d9067ef06bb383324d9996f05b2a9bce440db2251afa2f54572466eb65d44cb6d87f3987aea379915837a77ac4d4415227550641904be96fec479556974e31ed17886313666452fc5b0ade9f26a8f31afe79a9b488ee490edab895c04d53800bc0e5588e6b53510e475cdea3a8412ed608635c6ca2b1339fc5d59c26fdce39eacd96bcf35328d72cbc1a9ba9bd77a4d48d7c4aba8bca3f7a26c77b7f6214bbfce39150fa0f379b12f03082bb1ca0049970a0167fe82a2a57bab45f71ae074e91f5389069bfc63f246ac603791d036d3a1f0e5bc43b45f712bd5c5bcf3dfece828ab27bef91d56859120477883570a2e2f9333dadd4784ca5bf2b8eea74ec1675f42813702d757976757e43f7033c4d20a24c2c0c95a4953f91558d57d284bed8a06420a043100656de9231fda5fafa372174bd03350ba1521651b985bd2c1908b77e991a05b88f5f3795f965a8e06b2a6a5970aeb61b9165bf7ff21c1305f7b38b0c7cbb573176bbcfa2cec9c28376fa913a0bfc66973c5074f0e17b75cb6771c1fb2fc574230a430ba9252a008f5ddf592d8bdf7451e7ef5561887a62f7bd009af1aec1cb2f6df14d92339f2c50e7df27acb57f6f559b5f482f88680830c75dd8c72ed3f4274332e463c50ef123ec0923e1ff41b0ef2a1ba34367717a140c5bb40b1bea9d37bc210814aa49274c2e0c250a6937193c78ca669d144fdec57a12838aaa7e9afde2252e60205afe4d7debac6b3a83ee278397e7d726adf19313c6e86cde476a972d802a75e89733fb244e90c7ecc95d45e9b4f212ddb0f0ff23432e450503cf9d49096aeed95a87a04abbd48bd16b76d0f9637018ad95f4cc414430d959dc62495ddeff46605d46bed43bc14d2197a58695cdd0368e349e1f4a5f79cab1baafd03894882c7ba65fb71d9ed6c83cb0116d82e68aa10fbc78327c6557bc40e243d75e42fa3400bf136612bb8a34a627b0142e38b9d36270e2ac6cb8c4702b10c2c053e2ac26d320a92706dfb13523d18537c70908708ab2dd2b0ea99fd0e5526a981bd6264efd24f91ef889c80eb5a7a4dca1d2e873941c6de349119d75f4787eb45f68faf95830efd35eeab2aa0a8298b545ace98de1ce624cdf73243cd4ea4a1d5bfe5dfb4043b15edd22d54421098d61a9daec76351695f27daef10cb78eaeb59efbc9799b1331a3e22c865bf2e98c1c42f824e9d94e469e263ee3e7fbfed0e0476ed1c40fb0d241ecf3805ce5ff80f788ef248cae42d1f587749fe1fd74a7bbdd64601224342f98466bc436cde6c651224ee641a228d268cfd51d6fe2427890bcca8c8416b89ce35cd6ced86af70de54d0db2fc5013c50b19adb7f6f00d6926cffddb78ad250469a6fde2d07c91b80f10d8d39d9248ec1098d8cae0faa7f49f7ad2b23daa8b422b0a67d71ba069a442777137beb9602cb62f837b76c070c702cdff652c02b06d45c260be52f563ce1a03a79883515061b72137b1e17dfea9dbf83a00be9cd2f24e45f365138e95d96428ff41b57cca57bdaa813de12ece414982b1ff96cf6c62b3fe92a96a43c0bb278ff598ddb979d8abb665a720ca9de77e4171685544c78bb489c2aa1e6bda2664883f460871f153f618d5605e945086be87a3651d23d23e0634184c8cab4aba9170df773dd3253352eb64b0d93a9d840f5a9d2dbfac29d91d249460fecb692362043cd33a2a1b74ee278db018b4cd406bb43c54234996d2a946daeae99e9583fef4a03469ad4b444eb910b8a48b1c61e093a8f54f43e20009bf6f9107a10c0577860573b1ea12bdce806214180df431029571a5386ddcc63f61a9c821ae8084f54b77c2d79cf56cc9fe86d0e963b82421fcbfce6ba3fa776886e27cd5b3032670e500ba8b7169fe00f7d5d44a75e92de54a4f4e3eea75e94037728fe398d3aaf31c7b2583a32d4fabd59c18add2b2751a907aeee10ea94d3786790fb1b353532d1b2b0f4a23a7146b27ae0f7ef8b5f77252d62a965c23402118ee19916821b2309964299a33b9c4bbb53524f40b59f0499d3a59124104c9157f61c0b3c2b6a9d6f78f76f70de2c80f5c087c5cfdac496ad0d5f0e2eb0c5d61d1a7ea961845b4c94ae8c8f2661b9c6a1de6bcd85e4651516354b268addcd39aba8d47869b516d942f79ea9778165acfeedccf835a199cc24202899a6a76f61a955f3a7f1f1bd97e00486df55c32d7efdd29a0c83f07a754e326f0600ca15f03b7e1574d7b1bc734fad04d60b4901b103151c3778da7929143973e5516b394f878def174b42a3ba55671fdf7af072c08d3b2e950645fe678e2819738441063020c93ef0e01a0cc78b228fe304160607e7f485a7da06d3f4b671be99c1d15f55a6e8cc18e04d22a1071a49b9750a3d0faa246df386fa96b44e2890ae8f6967dc34e6eaf68b4c671704f2618129c29a07f7b26928b41aa34fb586fd4cbce89a741c1f626e8371410d19a26ee62d43ef2763742067ee6aef43c6ca005ecc4a411d0826a63681318d7c230da92858de12fbeff6b6682241f50c8214d3986c141337f544fcb9afc7d8ba10f254ca3a5ef651d985567ef4c5f779dba647ba79c3edc1ecac8033f5db3069bf52780adbb40e018247085e269dd0c5adde02f8142b4a9da8fd2696483832f2896c7592877c482255a8ce70f78e52cd1170bba6bc465469db2abe497d0f95521f0b559342da0ea6198ed7d42c635c2c9288094a23ac8d8f750ec2e1d70d6de245c11a75b061b26fd3032d7377722b7646fbfe3760d39e4086d323a681c0a9c87c0181cbe063642435f670c722b29d101fb2e1726bbd95136e88ad845ee94d7401657a9f872d2e4deffd1751f9e3e9673a7b4bd3a8624501b5440d37ea0a8df8da0864a39a6995fc715a75e7ec2135264fc89fce39a46f6af20c02f2948ddf65847a844377999408f77d0acc94745d86c76f00827a0034136c572eb80250118c2767356d1c33898fa0587906175bf1469e0b7803e7a8edbaaa56c071133c7712bd4c88797a79d8488a75f65b37e2055713b2051c39f7ddf1774950c061b42632d19850116aeac4523c75364139f784e4848e12555d58ca4a242e03af86e8d6abda975e1494255d90a591453abb5137811cb9a76be1e9b039fcc31a79b51b2c81de66da7828d3942c7cb56829ec7f2837f19674050ce79485ed74e650e22f7a2933af96e58972c47c07f42f888a32de03e6c0ff3b71e683d436bb16f89e1c84f0818335c0dee672f0262338933181bfdc216bb6f30d0245cae35b51013453393a19b049c890d3ac671c5b35b60c37dc94eb82c6412c110db12859eb8e3ed581772836562ec6692797888dbf1d22f294d85727c602b75e5092b5468efb37a4d715544734d0e1faa4ddb060bfe2b30948f92691e4f58d8db0cd8d872ea523109c1549677c3f7a3049b776cec84486592d01d81852c9d457acb0febca92c1d69614336fd99ed0a6c5a4c912d8d294d56ae848adc907240dec2058ecb288e73ee43c1ed914b2fe8290b06e2cb33120707e83ef29a0d97be7c3d70573afee63882d24742462ab7df1a8dad14c54913b33e5c0db13cfaba9116023a8bc9d50795f71424c50035af9c245556d8642f8e6bca93cbeb7fbb96947d27f8c349cab953db4a3bdda236975771277bc0532373b4d16458edfb23b58626e71befcadf93a059abdefa65224e6f5a5ffdaf40abe471273cbbf3730aff910c6adddc95c4aa28b0ea6ee0bbcb616b4d5bc2ec2b2e7b1c6dcb27ddf4166d75506496e9b252536f936fcd74abd45c8e2296a84a9754c319819664854aeaf73faf44b50ea586cb9598e555690e866ffd5ee64c0978c3c0870fb0ff4faf008095f72604a3529fa166c4696bd013550bec18274d7a8427607078455673f3ae8526c51a834f338c95c62e3abad642ab778283ce79e68d7c38debd6656d6549c8710aa64b2dc1775cffc8aea36a4", 0x1000}, {&(0x7f0000008040)="dfefa7a7cbd1049158cc7930dd6d6b16984d5e5219f3dde4aa984c7131c6f7e36a28a9a3ae2c73b7397b133bd252a7437eebf614efa7a405a22efb980883e1ac284ba2ee0f1f526ac67f5c929ef9a19434f22f95b8c6384a01f517be3e2934e9e603fd91001528f62be78c0cda97afd863b1173e1d3d2c62cf56a7e5d827bca64121b881f21e695e8b4c285a503b", 0x8e}, {&(0x7f0000008100)="9cd3bf02362592989af8be9adb79b0616747cc43cec3a8bd29703c7d30103ece4ef09c939873fa655f240447837fe17b3ad4d764623453aaafbe90fcb509e3989ce5b4d5a92a4a700c8d8fbdf03229b56f7d9151177812eef42f13d3290c7fce2f34cc368fba99a23f019c546f41", 0x6e}, {&(0x7f0000008180)="f7f6df6941c226aa0f75133582916da2f53573f35f77809c8d67c2299c533fa453401d4d05e5ec92d63e0b3e5eb65fa79800ddad13ac390bc35681fc0a875e0c980bda38ba5844fe3bacd4023d73c22a852eb8e527e861daa32292d3a93eb88a4907fae754a31594c103", 0x6a}, {&(0x7f0000008200)="c8660dfcc1dacacf7cd175236aae102e06498a2dd79141b1e13433af95e1fbdd43cc283da84cd2b209b8372a22c072895c5ccd9983ffae1a97b9d555eb32a5db0abdcc4424610778eb58a89850f848917c8b2910dcc7c1139068318602f85df0f532dfd0be8ab6b6a4e6197d323bd11197052f45304c296c43cb077012daa7e772d8f9258b37d7e30daad44999215a9909ddb57b3d44f95041a8523f504b54f0d79d1b6e9b487f0aa8878f15e08968406ea995ef6fba9a54cfefc5f3015a70", 0xbf}], 0x7, &(0x7f0000008340)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x18}}], 0x7, 0x48040) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400) ioctl$DRM_IOCTL_AUTH_MAGIC(r5, 0x40046411, &(0x7f0000000100)=0x8) [ 1596.151136][T28135] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200102004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000011c0)=""/127, 0x7f) 21:00:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000006800000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000100001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000012c0)=ANY=[@ANYPTR=&(0x7f0000001280)=ANY=[@ANYPTR64=&(0x7f00000011c0)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYBLOB="72bb05dec4c60bee535849d920c56859fa80a0361a11c7c932986757cd510fd5b8f4b6a0cc5687d3cb366b1172f2d2fd7dd2b558451f1295924cd90b8f4ac519e4e5c4db7d54b0f18d99643296ec78bbecbcd1bf433a20d78d3684106efa560e48f389316a3c"], @ANYRESDEC], @ANYRES16=r1, @ANYRES64=r0, @ANYRES16=r0], 0x14) ioctl(r1, 0x101, &(0x7f00000000c0)="06f2ca35dc29f110b0abee4e8208f8e5b0f5bd5654adf2409f1c7e3647530f2fccb718c2a7058e6f164cc89f3c788914c9c91c6206bd4f8c63524938f91c8dd1939414668ec10dbb5d45398afda3d2e5b472e8a721f52da2682e1af424e2e60f17") recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) write$binfmt_elf32(r0, &(0x7f00000011c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1bd, 0x200, 0x7, 0x20, 0x9, 0x2, 0x3, 0x0, 0x1bd, 0x38, 0x136, 0x400, 0x7fff, 0x20, 0x2, 0x81, 0x1, 0x5}, [{0x2, 0x7f, 0x1, 0x0, 0x10000, 0x10000, 0x4, 0x100}], "791b313540f6852f4dce5deef7810975db33aff8b1ca5d16151e44276fd1e5d948ce6b0a105bae249068aa18d0e8485ce827cf4fe4c3c1684be2307c89b422b9cfd5775be4a72a520851c096ee8528b1cb4c8f2e58d9ff725e572223509ef967a609dc5c7a709614398bab3f4f5e8a9cdb70ba880bf9c46293f2c4021de90d99bf77d22eb156ad6194afc75adf992e23bc0f439d3e5aee6c840d82cba492cbd0dfdebf21c8e7092569f1099fe83ff4645a7755e65076e1107577006eca5eef71bc872c98c74c7398d301659c8b", [[], [], [], [], [], [], [], [], []]}, 0xa25) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1596.505008][T28692] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000040000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0xffdd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000001300)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_dev$midi(&(0x7f00000011c0)='/dev/midi#\x00', 0x2, 0x41) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001200)='/dev/autofs\x00', 0x10000, 0x0) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f00000012c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80020000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x40, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r5}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x4) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0xff4d}}], 0x1df, 0x0, 0x0) [ 1596.600860][T28804] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r0, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x2c}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x13b}}], 0x1, 0x100000000, 0x0) 21:00:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000011c0)=ANY=[], 0x0) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 1596.898242][T29029] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1596.922062][T28692] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000011c0)) 21:00:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01070000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1597.164474][T29129] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200002304000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001240)=ANY=[@ANYRESOCT=0x0, @ANYPTR=&(0x7f00000011c0)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES32=r0], @ANYRES32=r1, @ANYRESHEX=0x0, @ANYRESOCT=r1, @ANYRESDEC=r0]], 0x1f) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 21:00:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000006c00000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000480001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000050000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 1597.462592][T29618] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1597.547094][T29674] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000000c0)=@add_del={0x2, 0x0}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e000000330005", 0x7}], 0x1}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000180)) ioctl$int_in(r0, 0x800060c004500a, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x10, 0x1, 0x11, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x9, 0x3be) perf_event_open(&(0x7f000001d000)={0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x0) [ 1597.658552][T29678] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 21:00:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01080000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1597.832285][T29802] device nr0 entered promiscuous mode [ 1597.891264][T29690] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000000c0)=@add_del={0x2, 0x0}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e000000330005", 0x7}], 0x1}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000180)) ioctl$int_in(r0, 0x800060c004500a, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x10, 0x1, 0x11, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x9, 0x3be) perf_event_open(&(0x7f000001d000)={0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x0) [ 1597.942253][T29685] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1598.126972][T29915] device nr0 entered promiscuous mode 21:00:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000060000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:36 executing program 0: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="740000002d000b05000000ffffff63a55b0bd467", @ANYRES32, @ANYBLOB="00000014f1ffffffffffffff080001007366710048000200ff03000000000080b9a00600000000000000030000000033cc3598c9aa8178bdf1000000000000000000000000de7f4687000000000000000000000001009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d845549c55af303007bfb7232a524afef20c0034fbd32262c964c61f3771603fd386dc70a77e506002bd950e808d63007d6c6251ac28f6b621f863af067671514a2ab528d7d2bef3b8444b64c874370810633f2eb7d7a89d0f3cf2074bb2e180708593cd728826dfe7b7bc2cbc705ed95700983ea22eefa47c53252758e28ba5302e15a86aff40a0cb6088e18f3326fa3a5dcd32cb951da688b87961591b4671e40cf37feaa14dd000000000000321e6e4daef23cf875a45a0643142ac688f2a10d2a194d7079ce17e9cbda5da7ecf526f153140e6740200000b3c3c00b656f9021957cb27486eea0345bdf43b770452e1353b94884160ab1357707dacc631c885e515d18f9e1697a8604cd27f232de351b821c373ad44e60efd73e28c85c3f602e6f2d8268632cf7ab32f50ae8dc09e8b4eac7c711a4eae1a64d7a79f6905f21ae9d412522ea6922cc73de45faa9ed7fca3f51b8735a5b80a3e4f2a734244c4bb59be1d2a81c2e4a41fd55019f6e63433634d7b5e8bf7e7ef1a7af72ce50388b86e4fe38648bcedcedc38ff9d9c3c7c8951f7fecd29780fd125117ed98a16b66e623abd8f08738bd5222de9ddfc43e84ab45beb28f0da722c8a8fbd2b506ffe4df974644f112a094546909b98ec249578181e8594f3aefb4db554dadd97be43ed277f88ad03bd90fb53921b37a7d2e"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1598.186730][T29800] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1598.213185][T29674] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1598.259749][T29678] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 21:00:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000004c0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200003f04000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:36 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x20010001) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x80000001, 0x4}) 21:00:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000007400000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1598.579533][T29920] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:36 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000003c0)="11dca50d5e0bcfe47bf070") setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 21:00:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000070000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01090000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1598.887203][T30150] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1599.079933][T30041] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000007a00000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000640001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1599.351773][T30156] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000080000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1599.492134][T30164] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 [ 1599.534258][T30150] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200004004000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1599.790873][T30177] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:37 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80800) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000680)) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getpriority(0x2, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000040)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@loopback, 0x4e24, 0x7ff, 0x0, 0xffffffffffffffce, 0x0, 0x0, 0x20, 0xff, 0x0, r1}, {0x0, 0x7, 0x92b, 0x0, 0x0, 0x0, 0x8, 0x1}, {0x0, 0x8}, 0x2, 0x6e6bb8, 0x0, 0x1}, {{@in6=@remote, 0x4d4}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3505, 0x3, 0x1, 0x6, 0x0, 0x30000, 0x9}}, 0xe8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) 21:00:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010a0000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1599.946579][T30187] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:37 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000001940)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000001c0)={{}, {}, {0x0, 0x0, 0x1f, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x80000000000000}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1600.092590][T30210] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1600.128357][T30175] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 21:00:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000090000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1600.156315][ C0] net_ratelimit: 14 callbacks suppressed [ 1600.156323][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1600.167754][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1600.173540][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1600.179294][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1600.185060][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1600.190808][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1600.192475][T30513] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 21:00:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000680001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:38 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) pread64(r1, 0x0, 0x0, 0x0) 21:00:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100ffffff8c00000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1600.357008][T30406] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:38 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) pread64(r1, 0x0, 0x0, 0x0) 21:00:38 executing program 0: socket(0x1, 0x4, 0xed3) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x2e1, &(0x7f0000000040)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104, 0x0, 0x60}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 1600.567133][T30528] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200004804000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1600.669224][T30732] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 [ 1600.694622][T30734] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:38 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, 0x0) 21:00:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010b0000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100008000a000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000a0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) socket$inet6(0xa, 0x0, 0x525dd624) [ 1600.981749][T30751] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000006c0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1601.141838][T30873] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1601.199702][T30872] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x0, &(0x7f0000000480)={[], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) 21:00:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200004c04000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1601.356285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1601.362057][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:39 executing program 0: mmap(&(0x7f0000197000/0x10000)=nil, 0x10000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) [ 1601.422206][T31000] SELinux: duplicate or incompatible mount options 21:00:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000edc000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1601.486034][T30883] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:39 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x1f, 0x3, 0xb487}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000ac0)=ANY=[@ANYRESDEC, @ANYBLOB="8d"], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0}) [ 1601.596286][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1601.602185][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000b0000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01100000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1601.714482][T31113] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 21:00:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/44, 0x6}, {&(0x7f0000000140)=""/4096, 0x7608}], 0x2}}], 0x1, 0x0, 0x0) [ 1601.968436][T31118] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 21:00:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000740001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 21:00:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) [ 1602.014790][T30994] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1602.088587][T31187] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:40 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000003, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\b', 0x175d900f) 21:00:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200006804000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1602.251102][T31156] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 21:00:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d0100fffffff600000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1602.441193][T31395] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop1 [ 1602.553945][T31187] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:40 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xebe5, 0x80) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0xf000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x00', 0x1ff) unshare(0x800) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) semget(0x0, 0x0, 0x20) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x257, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfff, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20003, 0x0, 0x0, 0x0, 0x1}, r3, 0xd, 0xffffffffffffffff, 0x0) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f00000001c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) ioctl$void(r4, 0x0) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000010010000010000007774000000000000f41b25e443c9577f8df71ebddf077798b47ab4a76907477a209522adca7e5454b7dec9d90a7305c04a8ccffca56ccbcabfb25cc94628348a24593c6fbdf200796a8fd217367c017f76f131c8693ac43b77471be91424707d2c3545b812f7f58f436706f17b26ae3208e5809f51528f2436610c52b724cd3141a5cb7a0a9c50ca0a16787a4d0c82e2d9829219e3d910228437d90fa589a35bd504ebb981d196f1b7256c49aac96b000000002150a405"], 0x18}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0), 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x6c84, 0x600080) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) socket$isdn_base(0x22, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_create1(0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000100)=0x100000000000, 0x4, 0x1) 21:00:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01230000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 21:00:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000100000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 1602.813158][T31466] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 1603.017882][T31574] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 1603.036591][T31395] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop1 [ 1603.104396][T31584] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop5 21:00:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000000007a0001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1603.227695][T31588] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 1603.240383][ T6195] rxrpc: Assertion failed [ 1603.245011][ T6195] ------------[ cut here ]------------ [ 1603.250449][ T6195] kernel BUG at net/rxrpc/local_object.c:433! [ 1603.256562][ T6195] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1603.262620][ T6195] CPU: 1 PID: 6195 Comm: kworker/1:0 Not tainted 5.3.0-rc6+ #122 [ 1603.270308][ T6195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1603.280376][ T6195] Workqueue: krxrpcd rxrpc_local_processor [ 1603.286154][ T6195] RIP: 0010:rxrpc_local_processor.cold+0x24/0x29 [ 1603.292444][ T6195] Code: 3f 64 c0 fa 0f 0b e8 e4 c4 d6 fa 48 c7 c7 e0 59 3a 88 e8 2c 64 c0 fa 0f 0b e8 d1 c4 d6 fa 48 c7 c7 e0 59 3a 88 e8 19 64 c0 fa <0f> 0b 90 90 90 55 48 89 e5 41 57 49 89 ff 41 56 41 55 41 54 53 48 [ 1603.312015][ T6195] RSP: 0018:ffff88808d437ce8 EFLAGS: 00010282 [ 1603.318071][ T6195] RAX: 0000000000000017 RBX: ffff8880a420c078 RCX: 0000000000000000 [ 1603.326028][ T6195] RDX: 0000000000000000 RSI: ffffffff815c2576 RDI: ffffed1011a86f8f [ 1603.333965][ T6195] RBP: ffff88808d437d30 R08: 0000000000000017 R09: ffffed1015d24101 [ 1603.341902][ T6195] R10: ffffed1015d24100 R11: ffff8880ae920807 R12: ffff888097a95848 [ 1603.349838][ T6195] R13: ffff88804ba52fc8 R14: ffff8880a420c040 R15: ffff88809a73d540 [ 1603.357784][ T6195] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1603.366716][ T6195] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1603.373267][ T6195] CR2: 00007fd8651eba20 CR3: 0000000095f7e000 CR4: 00000000001406e0 [ 1603.381206][ T6195] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1603.389160][ T6195] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1603.397103][ T6195] Call Trace: [ 1603.400362][ T6195] process_one_work+0x9af/0x1740 [ 1603.405284][ T6195] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1603.410643][ T6195] ? lock_acquire+0x190/0x410 [ 1603.415289][ T6195] worker_thread+0x98/0xe40 [ 1603.419766][ T6195] kthread+0x361/0x430 [ 1603.423807][ T6195] ? process_one_work+0x1740/0x1740 [ 1603.428983][ T6195] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1603.435190][ T6195] ret_from_fork+0x24/0x30 [ 1603.439571][ T6195] Modules linked in: [ 1603.443712][ T6195] ---[ end trace 0f8a0597d97fb28a ]--- [ 1603.449189][ T6195] RIP: 0010:rxrpc_local_processor.cold+0x24/0x29 [ 1603.455539][ T6195] Code: 3f 64 c0 fa 0f 0b e8 e4 c4 d6 fa 48 c7 c7 e0 59 3a 88 e8 2c 64 c0 fa 0f 0b e8 d1 c4 d6 fa 48 c7 c7 e0 59 3a 88 e8 19 64 c0 fa <0f> 0b 90 90 90 55 48 89 e5 41 57 49 89 ff 41 56 41 55 41 54 53 48 21:00:41 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xebe5, 0x80) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0xf000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x00', 0x1ff) unshare(0x800) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) semget(0x0, 0x0, 0x20) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x257, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfff, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20003, 0x0, 0x0, 0x0, 0x1}, r3, 0xd, 0xffffffffffffffff, 0x0) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f00000001c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) ioctl$void(r4, 0x0) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000010010000010000007774000000000000f41b25e443c9577f8df71ebddf077798b47ab4a76907477a209522adca7e5454b7dec9d90a7305c04a8ccffca56ccbcabfb25cc94628348a24593c6fbdf200796a8fd217367c017f76f131c8693ac43b77471be91424707d2c3545b812f7f58f436706f17b26ae3208e5809f51528f2436610c52b724cd3141a5cb7a0a9c50ca0a16787a4d0c82e2d9829219e3d910228437d90fa589a35bd504ebb981d196f1b7256c49aac96b000000002150a405"], 0x18}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0), 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x6c84, 0x600080) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) socket$isdn_base(0x22, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_create1(0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000100)=0x100000000000, 0x4, 0x1) [ 1603.475182][ T6195] RSP: 0018:ffff88808d437ce8 EFLAGS: 00010282 [ 1603.481269][ T6195] RAX: 0000000000000017 RBX: ffff8880a420c078 RCX: 0000000000000000 [ 1603.489255][ T6195] RDX: 0000000000000000 RSI: ffffffff815c2576 RDI: ffffed1011a86f8f [ 1603.497395][ T9885] kobject: 'loop1' (000000008f7685b7): kobject_uevent_env [ 1603.505034][ T9885] kobject: 'loop1' (000000008f7685b7): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1603.507656][ T3907] kobject: 'loop4' (0000000074aded2e): kobject_uevent_env [ 1603.515249][ T6195] RBP: ffff88808d437d30 R08: 0000000000000017 R09: ffffed1015d24101 [ 1603.540169][ T6195] R10: ffffed1015d24100 R11: ffff8880ae920807 R12: ffff888097a95848 [ 1603.543281][ T3907] kobject: 'loop4' (0000000074aded2e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1603.548182][ T6195] R13: ffff88804ba52fc8 R14: ffff8880a420c040 R15: ffff88809a73d540 [ 1603.548192][ T6195] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1603.548199][ T6195] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1603.548206][ T6195] CR2: 0000000000b8bd40 CR3: 000000009b95d000 CR4: 00000000001406e0 [ 1603.548214][ T6195] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1603.548220][ T6195] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1603.548225][ T6195] Kernel panic - not syncing: Fatal exception [ 1603.549343][ T6195] Kernel Offset: disabled [ 1603.616926][ T6195] Rebooting in 86400 seconds..