rol(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000780)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x17, 0x5, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x80}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='GPL\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x5, 0x8000000) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x220000, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:46 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:46 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:17:46 executing program 3 (fault-call:15 fault-nth:6): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:46 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000280)=0x6) eventfd2(0xfffffffffffffff9, 0x800) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r4, &(0x7f0000000a40)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4401000}, 0xc, &(0x7f0000000880)={&(0x7f00000009c0)={0x68, r5, 0x120, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x800, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000540)=0x1, 0x4) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:46 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getgid() fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@loopback, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800)=0x0, &(0x7f0000000840)) getresuid(&(0x7f0000000880)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x5, &(0x7f0000000580)=[{&(0x7f00000001c0)="f3f9d51e5238a45058be7ced8c8540ab489554575b8174752a3bf66a43ae73aa17f3e504d5c0cd9efaae053b6777e4ea7aae1ff5893c6b196c44194cd9fc6f715cab7b34a1be1511119543c68544f6ea0695ac1551f8c47ad28fc615599584bf43e8bd4c681ea2345a7dc8ca24b549e1bee071d7a8b22772f96c4d49beb024d81e8a9623e4e87f11f0030772625258b428a11773c0a4c0f50aa6305a9daa875bcec8d27f0d61f154fdd791f812374942aebd29beaddbd3fe0fcdce81ff8ead4bc2b0eea18318aaa13e16afcbc119166d6369e3e5b302dd9ce7f2a8bfc7", 0xdd, 0x4}, {&(0x7f00000002c0)="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", 0xfe, 0x2}, {&(0x7f00000003c0)="4963e76566cc554684d831f426c4ff4bbb7ddce0d8a27e6fbf0b069c07ec76c208fb20f6034b9c3039f3717af7643ef2e1fac2990696bfb3df9a95e5de0e20c769f337c6b924b1e2fc4dc94f45180e998c19b98a7882677301cc5b634a77d80d04a4777bb99cfa2a41b924e307d0ce7c8066c9b76e39f76ade830d3a9f", 0x7d, 0x2}, {&(0x7f0000000440)="ad637b0082ecd98c74822a2d7ad815fb53c247bbcc2eeaa15fc9b8b244ee07433e0950c5e9a6333b2d8dc7b583b977890a1865d4a72396092c105b0d02e2baab2fd967fc5785179a67156ceb0682dff9ac2f1a116c27b121ac2710b63ddef45f3e1aa5f1583d3bdf8d8a16e37ec8515ef080163a9ab12772ea4109119abbf0cbdfcb82dcf79e668521624d0eada40091ecc19a1e1904e592e57bc2d6dcb390132a1b513b987db8e16f05fc439089fbafa44f0d4c1eda77892499a355a2acbcdbaf73f92897c44d98c37bf513", 0xcc, 0x7}, {&(0x7f0000000540)="149efbb3d9bcef21c681dbb00ead864d44d4b8349d58bd042ee91e0fa39910a888247e493d2f922455bc8118a4220cc14e8011fd10f1eee5a7fcf3c4", 0x3c, 0x1}], 0x20, &(0x7f0000000a80)=ANY=[@ANYBLOB="6769643de5c926bc6301264601f5df2c4676f2a19841011f7ca1bb9411cb7068167075671b0ed8491ef0d6a686a8c9fa3b02b7cfc6e3", @ANYRESHEX=r1, @ANYBLOB=',nocase,shortname=lower,shortname=winnt,nnonumtail=1,rodir,euid<', @ANYRESDEC=r2, @ANYBLOB=',uid>', @ANYRESDEC=r3, @ANYBLOB=',appraise_type=imasig,fowner=', @ANYRESDEC=r4, @ANYBLOB=',euid<', @ANYRESDEC=r5, @ANYBLOB="2cf8"]) r6 = socket(0xa, 0x3, 0x8) r7 = dup3(r0, r6, 0x80000) ioctl$PPPIOCATTCHAN(r7, 0x40047438, &(0x7f0000000940)=0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r6, 0x29, 0x44, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000000)=0x1e) fcntl$F_GET_FILE_RW_HINT(r6, 0x40d, &(0x7f0000000080)) 13:17:46 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:17:47 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103}], 0x0, 0x0) 13:17:47 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 515.789007][T32516] FAULT_INJECTION: forcing a failure. [ 515.789007][T32516] name fail_page_alloc, interval 1, probability 0, space 0, times 1 13:17:47 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101000, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x5, 0x8, 0xa, 0x400, 0x42, 0x2, 0x2, 0x4, r3}, 0x20) r4 = fcntl$dupfd(r1, 0x403, r0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000040)=0xc65, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) fdatasync(r2) close(r0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r3, 0x8}, 0x8) recvfrom$unix(r4, &(0x7f00000001c0)=""/38, 0x134, 0x40010002, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0xfffffffffffffff7) ioctl$sock_rose_SIOCDELRT(r4, 0x890c, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xb428, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x2, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) sendfile(r1, r2, 0x0, 0xffffffff) [ 515.904814][T32516] CPU: 0 PID: 32516 Comm: syz-executor.3 Not tainted 5.1.0-rc1-next-20190321 #8 [ 515.913882][T32516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.924037][T32516] Call Trace: [ 515.927347][T32516] dump_stack+0x172/0x1f0 [ 515.931724][T32516] should_fail.cold+0xa/0x15 [ 515.936339][T32516] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.942157][T32516] ? ___might_sleep+0x163/0x280 [ 515.947103][T32516] should_fail_alloc_page+0x50/0x60 [ 515.952356][T32516] __alloc_pages_nodemask+0x1a1/0x7e0 [ 515.957758][T32516] ? __alloc_pages_slowpath+0x2900/0x2900 [ 515.963499][T32516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.969766][T32516] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 515.976015][T32516] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 515.982265][T32516] alloc_pages_vma+0xdd/0x540 [ 515.986957][T32516] shmem_alloc_page+0xc0/0x180 [ 515.991744][T32516] ? shmem_swapin+0x1a0/0x1a0 [ 515.996429][T32516] ? lock_downgrade+0x880/0x880 [ 516.001310][T32516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.007606][T32516] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 516.013341][T32516] ? __vm_enough_memory+0x320/0x5a0 [ 516.018563][T32516] shmem_alloc_and_acct_page+0x165/0x970 [ 516.024211][T32516] shmem_getpage_gfp+0x43b/0x2500 [ 516.024272][T32516] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 516.024289][T32516] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 516.024303][T32516] ? current_time+0x6b/0x140 [ 516.024317][T32516] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 516.024342][T32516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 516.035508][T32516] ? iov_iter_fault_in_readable+0x22c/0x450 [ 516.035533][T32516] shmem_write_begin+0x105/0x1e0 [ 516.035612][T32516] generic_perform_write+0x231/0x530 [ 516.074075][T32516] ? page_endio+0x780/0x780 [ 516.078598][T32516] ? current_time+0x140/0x140 [ 516.083299][T32516] ? lock_acquire+0x16f/0x3f0 [ 516.087989][T32516] __generic_file_write_iter+0x25e/0x630 [ 516.093629][T32516] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 516.099365][T32516] generic_file_write_iter+0x360/0x610 13:17:47 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @rand_addr=0x3}, 0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 13:17:47 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 516.104838][T32516] ? __generic_file_write_iter+0x630/0x630 [ 516.110731][T32516] ? aa_path_link+0x460/0x460 [ 516.115423][T32516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 516.121677][T32516] ? iov_iter_init+0xea/0x220 [ 516.126388][T32516] new_sync_write+0x4c7/0x760 [ 516.131079][T32516] ? default_llseek+0x2e0/0x2e0 [ 516.135969][T32516] __vfs_write+0xe4/0x110 [ 516.140309][T32516] vfs_write+0x20c/0x580 [ 516.144562][T32516] ksys_pwrite64+0x183/0x1c0 [ 516.149161][T32516] ? __ia32_sys_pread64+0xf0/0xf0 [ 516.154200][T32516] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 516.159668][T32516] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 516.165144][T32516] ? do_syscall_64+0x26/0x610 [ 516.165163][T32516] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.165177][T32516] ? do_syscall_64+0x26/0x610 [ 516.165200][T32516] __x64_sys_pwrite64+0x97/0xf0 [ 516.165220][T32516] do_syscall_64+0x103/0x610 [ 516.165244][T32516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.195922][T32516] RIP: 0033:0x412207 [ 516.199826][T32516] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 516.219445][T32516] RSP: 002b:00007f96ef72ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 516.227867][T32516] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412207 [ 516.235847][T32516] RDX: 00000000000000e3 RSI: 00000000200008c0 RDI: 0000000000000005 [ 516.243824][T32516] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 13:17:47 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x2d4100, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r6) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000c00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x5c, 0x6, {"4e19889924a159a7f891b986b8da7d7e4a5cfd225cbcbf2bcbb399153709149cc0c22605af0536ded1f6d726f6f19f81aede03884b3e2db180a927b92b10de67971a79"}}, {0x0, "edab9fa5404a30a39b9bfd59367099c83dd58df7e447340cb53f05b5927d04b5d66df5bc8e6dea1a4d7e283198495e617a4a9c"}}, &(0x7f0000000cc0)=""/114, 0x91, 0x72}, 0x20) vmsplice(r3, &(0x7f00000007c0)=[{&(0x7f00000009c0)="073e74138b46b01cade9a8362ecb9946625d154d454343c1fa55fc6fe7ef97fde28338c572544f5ecd9b2ab9335103c2806f8c7f6dd50d3ea7880c3e24d695046837fa21bdf4e0e02d53f178f48cd1d677124a060002ee566fed9171671a7e0c923a14b8d8a8d403b397b9ce3648e04b0a48a0ca1333ccc4f7ed07fa99e7de1f52e8d6c0c9e48a1e1c4eb7ec2666eb42cb93517ee93b608dffb4369c28584d8637807f9a83cd403e1858492dfc", 0xad}, {&(0x7f0000000a80)="7e136b35e312ad9dfd6b0b02b0b18c80e4bfc30717ca2d6cad21ddf3718c410cfdfa18570610b763aa0c4f06ca63a91a43569ef806cffdaa62ef657a8ba3edacb2bc5d9cca90b1951c734ab2be2684d39c983a6af92d4fdd6d8da47fcfefa8271ff7c27b46f64f03f1008ffc40453f0ef4d824146ec69f207e9898d655eca71dd893d841cef8f5fc6a4a3eed43867de04b2ca47fdbdfe0a787375e1822305f59a5662cec3c8ff1bb981302d801549bfc21225485fa1493a2e7d84c1d1d41223159b79161870f282064b4b6c84abba7c20bc9f18b6d", 0xd5}, {&(0x7f0000000b80)="6a33d56d068b62ec9210104f893af13500f33d9c276d0c13f71c95309264473e8fb1fb81813682ad95c3c07dc4c9d6e41357e2b0ff49f247bcf948c8f7228a710e21022c668129342077057b96a5", 0x4e}], 0x3, 0x5) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) syz_open_dev$ndb(&(0x7f0000000780)='/dev/nbd#\x00', 0x0, 0x6a0082) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="1000000017000007762169637f37af3b9c7e36a8"], 0x10) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) 13:17:47 executing program 4 (fault-call:15 fault-nth:0): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 516.251803][T32516] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 516.259788][T32516] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000004 13:17:47 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 516.434613][ T419] FAULT_INJECTION: forcing a failure. [ 516.434613][ T419] name failslab, interval 1, probability 0, space 0, times 0 13:17:48 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x80) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) close(r0) [ 516.525056][ T419] CPU: 0 PID: 419 Comm: syz-executor.4 Not tainted 5.1.0-rc1-next-20190321 #8 [ 516.533960][ T419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.544024][ T419] Call Trace: [ 516.547337][ T419] dump_stack+0x172/0x1f0 [ 516.551700][ T419] should_fail.cold+0xa/0x15 [ 516.556322][ T419] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.562155][ T419] ? ___might_sleep+0x163/0x280 [ 516.567018][ T419] __should_failslab+0x121/0x190 13:17:48 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 516.571963][ T419] should_failslab+0x9/0x14 [ 516.576479][ T419] __kmalloc+0x2dc/0x740 [ 516.580741][ T419] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.586993][ T419] ? fput_many+0x12c/0x1a0 [ 516.591424][ T419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 516.597678][ T419] ? strnlen_user+0x1f0/0x280 [ 516.602378][ T419] ? __x64_sys_memfd_create+0x13c/0x470 [ 516.607934][ T419] __x64_sys_memfd_create+0x13c/0x470 [ 516.613317][ T419] ? memfd_fcntl+0x1550/0x1550 [ 516.618103][ T419] ? do_syscall_64+0x26/0x610 [ 516.622794][ T419] ? lockdep_hardirqs_on+0x418/0x5d0 [ 516.622814][ T419] ? trace_hardirqs_on+0x67/0x230 [ 516.622837][ T419] do_syscall_64+0x103/0x610 [ 516.622862][ T419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.622875][ T419] RIP: 0033:0x458209 [ 516.622892][ T419] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.622908][ T419] RSP: 002b:00007ff26b80ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:17:48 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f0000001e40)={0x0, 0x0, &(0x7f0000001e00)={0x0, 0x4, 0x6, 0x100000001, 0xbc}, 0x3}, 0x20, 0x1, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2, 0x18) sendto$netrom(r0, &(0x7f0000001e80)="dadcc266dbdd116a1c71e6113b5a832c433b5d921572e8afa0fe58aba8cb52e882474e383df80318ba96491a70e95affb2376a998ba471eaf0ddd3ee4a8a6250b9980cb36af37ff5d503fefe68c4f0789ae8ec2669f644efa2ffa0cfb6f7a084a7044b54f28edea23245a47b9f75cbd77b5397c5088f98f03c68eedf86240ac7bfb392c476d60bb512dc6b4a0fd5f76e62456898ae9975ceb44a4e74b80300b3925f333b6afd6578f3482c58ab0e3a1c1675da9225b406", 0xb7, 0x20000081, &(0x7f0000001f80)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f0000001f40)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) sendto$inet6(r4, &(0x7f0000002000)="20aa04b71d78b19243cd1f5248710c6e9b2fe18f52768321a0879c016d95620e1066c069d21bed02717adb8c011d435994c35256bf6a59ff5ee3587ff268d8bcffcf9ce7204e2a1d553bd2f31f4bffcab90d6b15fa41e28b5adece49c017418827f262eeab22be", 0x67, 0x20000000, &(0x7f0000002080)={0xa, 0x4e23, 0x81, @dev={0xfe, 0x80, [], 0x23}}, 0x1c) ioctl$VIDIOC_G_AUDOUT(r4, 0x80345631, &(0x7f0000000280)) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000009c0)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x160, 0x160, 0x0, 0x0, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000780), {[{{@ipv6={@local, @local, [0xff000000, 0x0, 0x0, 0xff], [0x0, 0xff, 0xffffff00, 0xffffff00], 'lo\x00', 'team_slave_0\x00', {0xff}, {}, 0x3c, 0x8, 0x1, 0x20}, 0x0, 0x120, 0x160, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x0, 0x10}}, @common=@frag={0x30, 'frag\x00', 0x0, {0x423, 0x3, 0x2, 0xc, 0x2}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x1c, "4222d1d4358f942ba4f6353150796d5d3525b3328bca6e86c4f565a67ac7"}}}, {{@ipv6={@ipv4={[], [], @remote}, @rand_addr="a4be329ccd790b02a74eb9313d339570", [0x0, 0xff000000, 0xffffffff, 0xffffffff], [0x0, 0xff0000ff, 0xffffffff, 0xffffffff], 'rose0\x00', 'ip6tnl0\x00', {0xff}, {0xff}, 0x3b, 0x3ff, 0x2, 0x20}, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x13, 0x401, 0xfd4}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, [], 0x18}, [0xffffff00, 0x0, 0xffffff00], 0x4e24, 0x4e21, 0x4e23, 0x4e22, 0x9, 0x3590, 0x2, 0x80, 0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000540)={0x2, r0}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000dc0)={0x0, 0x1000, "7dc1d9154475bfab1dafbe54c9d4380fe04aaab28de8c9272ec8bfb64155c0bdfc892b2370e0b70dd9984c8b911ef91bedd937e6a23f5f3d77d3b10a2920706e1b9b9468c561f070ef8f91e90274fa3a85090d50e1b57175a6cae30a44a32061280c99e6b3615a4df0c92fab4a724e7ce072be5f7b583ac5af10635d13686497f4e514e4bde6e8583384351037d0d33401b57aee0a05a2c273a6bd28cd6464f7f90bd16aca409c4dab5bea571556ed8a759d96650bdf31c7dda4585ab437dc41d692020442ad5936e45f165cfba9b139b129e3eb86dcc076ad6eed674c32c5f25614fd7f0632c8a5f3978fdd086ae8e46ab82f4ba674fe32083252b3b299cde8f675f7b9d37aab4275cdfec8fc5c7502977a6baced84703b5c8f47ed1e1daa4f341e8ccc84621e58bc596cb5ec72a6392b59be50d7a26c817b5f5d42f03799c03997a05b8932b79d7d1b92e3a6f69a7c71c2e94e99039485e1c5303489c9f5e26aedfb1fa297eaf597cc40143dd0d16623315ef0aa5308c9a037d6276241caf4320b5ed29e966d727677249c2206ebd9938f21f90707bc7f09878a1aaeaef8e07d6a15d14a64105960dd6e4251f8be116f1a12c8f2eb56659897cb9a306f70bc7225afd6e9a2fcb19e0b87fdc7135a5c56ab5df607e9d6ccce141807ebde6491cf53fae1041067c8e2cc89fd9a62af5ae954fedaec006fc20e94f7a6642151db9ecbc15a34d5cdb9286f26b4a79f6c6e9093968ae2db3a51351c024e5bd61c0886e8aef551bb9b90adfe9f5fcac67609b2978a806f005e0c13616378433b1dafe68562931acc1f28f0858020918d4eae509516f477110a64e873ff55cbd441173d4ad82ec359afb2359f19f908c2d8d52c15a089086bbf18bd57838269fd8dcdef4e55ced06260e162edc267455b5cb7cd69f10112fed3e44627814dbd9275067428f7e75af778ac0e9b708c8ea8e87dea8abaf786bcd9b62444e7b3e5725ae61e0800c5294d38472fc843150d7feb512f30852b2f2467acc101689a652baa4f426a8f1bddf0410a5104254fd7be126647494104e7a7d2db6e9ff45762fe59a865bbbec91a884e1b1ef8eb0dfc51acc6783431cc39659dab5d80c9daeb83e143019297d8383c121eb04c79fef70c10ce316ad434d1113149ff9a66eb918fb9cc1eb01691b338a552a3a33f6ce22b20886815d1090718fe285b423832b95f754523484fea6f22548031e73bfbb241d7d892a8f6c5b233940b417c8d3717b3120cf4b9e225eb26c47b722a0c6ff50f37b827ae9e2c713ce3dc40c030b39fdf1c964e6ec47b34ca9c5000d80b2744570fe6c85e7691ebee7d59713ecffa55848a536be5a95d8e70b1718364582583b7d87d187cf8ab193216d97e05f0a657d7741e5d8d0324c19c97dd23e59e8aa150053dde64639623996f4b92db1ed3fdd09f90d15c1a8c68f70132b9dde2464f2010c8c37783b1b471eee6b3e9931c7c6d0d1eec280a1b6e36163cb6e57e91ed46e037ee5e889ec10f09e033c85364dd5c9edf212c4bd94438d913158898004d41eaa3201c8a039222fbb4e69b49a38e3307bf54296f05dfd5d1269881f7dfd126ce05d8bad332c6a974899c343597d2ce495dc1409d47804ec4410ae1dc57fe8dbcc5a47e3a51254a33d8dcd6a250ab12bf1d3e8a42b8f99165d461c1e1c241ee8d6d2b65623c8c3f2e84c3ff2ed7fc856f4c30a18d3aea9aa1b2f98b38d8bc2e5ab7690b6eb2c84d896fc806e6c1221184c8cb6d4bc80d791479c7416d3602b48e42874e8e16229481dd05a5335b1d16567966d64cbd8e9b467ee60367ad7be64d891a8c53a14842ad2577a090c8b8a9072ed0c33dacfeecb81daff6fea09c68bf3d4f72533a3fd6e2d73d1e80e3bc989523a17d7a658f031a5ae459172b23f0c2e52863303281171448b309dffaffa7ea4f5edfe5a58be03d19acd1a946f43afa80f485f6a86a7c802fa7615ce363b369cf976f920c6ed8c824d516322ca3e29c7bc796756f58b197c3db70cd6ee7b85ada75ba10ed8aca9cd77b1b42847ccc9b27330f9349d1f7bac0169af49a22b633b1b57b4fd25ee0bf5f6bfffbe018d45e02f52766406e7ea6e22f86c34f8bcf3b4e714b305ad98cc8fc9ad576dbd159caab77699abc05f156553af7f50d151e4adcb04cc9c2e0bee581b611cc77b32cfd1fd8dc6737ac0bf4b7bcb6fdbd32063ab86fc4e9e212fab4318acfc6147f90261faac96f56df15c637229f9d567710861cca529615d6d7b406bddca92134c2d6748704149dfffe4eac36032d15fbc280934243ef992a824acd26964f2f1a0f6fadc7e2909a1679c7f00240ee26b30258e6a8fea064df80b8361425f24a2943ea582e200e541c77b9fced287b108842c1bea71370baa732c5ad4c74711ab0d25b7bf700bda20f857f8272c4bed0b8838bef50a215721ea21d52410e79c6c1f0bc0c6b88ad167bd36a5b94a096cdaf61322043926fe78e32bfb0c30cdec1dd4794dfcdab9d55a40c64a5d23c2522ee90770935b922934d6ac5b7161bb936fba38b7642138856010f42a981e4e8c9fd22792dc0651651d14dbeee43f48ebaec8cbea3c4de76b1309c6a7d387191e8250458f28cf5927dd0f38e8d7890d59f0a05520e6a5968b8a958b4baabf037c7388b3c3c4ad3c2a238457c34af9eb1a9fc484c9a2096e538dcd8a8c16eb65f07d8213d4071048f8e86cf9676e701e08a8e733fa759fc39e03bc158f6549509afe2bf678bd5a8869d5736d29e5505539e004b27ea21d846f1d1bb7b79b62b6e70c19a22ba5adda549824d9e2b541c0bb30bb2037f75464b7fef9ed1c5b39ef1dd792abf547cfe951bee44f73f72c6cd3ab04cddfab7b801c89826f69b21907ac6793822099add99272040e3dfc115c1a2ee8ab7aa18c902f38b072adc510bb6dbed2f5441f191e5e736c16faea87cc4019d5c246e5527a585cf7830ed750644198a27db30eef4384f3df8980452ae4c6242efb0cf5c27b1976e2648c8846e9eeabe54e2025a341c49778ed96acb7868ebf435aa1418b10b6fad2dfd39eaad5be4af3601bc5f0978f7339009329034cbdf98ff41e809e05b6ea34c06b9168457579a158f0afaef110fb7efc815d2feb63e71b833ee90ea45859ca5e208a1831a4f6180df6a2d107170741b88a10f065b897f3148e99ceb77bcc34a3ea16c4242bfb56399ac7e15ab2bffa8d5e6eba6e81b216382ee748a53b193a740e568edd7567c710a840d2773a9fa5ed3420f92ab2a98d5b319095780a9ac9fc256a480e67a257a7a084d2d3c2196a8596cebcbd177cca93bc0ca9ea761baa01d034f3f4a7463cf7d6701c40e34b78f29f4f953c821611e07a8db8c4adc5ca29e6b4178d03bf3baf8e5897ebbff0234de5ee43ea4998d4acb2415e38a1d58ba385a4fb442650e6d636b7a2f03dcbc6c1b412e796847706ed9c59ad6baa9939d0d41a3211cf0e3f1f2cedd9c5d2b6132da7f4aeb23625ded23fa6363a8ba686caa73060ac5efc9adf47dc2528c7ecb18da92a6532c1697ae1bff0012494e481cddf7576f0e34abbd71b9ee2b7afe8b5ac025a34ccdd132f50bf2a8b8f6e6ec579e2a7bf456cbda88ef5896fa27abe7664596eabc8bd7a1a45c2b5c5318456575d78a6e7e036dc5ba8f0ef6afa103f64bcb1772af33f12d29faef4e99ad2bc0686e0d0bdca94aa18cfeb8bf5fba96a5b2e08fca1d7afbc040ca3420038ca75aae2b4a85741a42598328a18675b46b1d3f825f81031abfc6ab6411af8b7246062d1130699a1a92c9e28bbcb6fbcbc1dfc868e0d714b6dfc233dbb8921fb4d355ed5990477292f26f4c9ec8bad225f8a12ca260eff0845fe093c14ef58f33cc51a9fb5fede8d6e2b740ef7e2e7fac1f4941d775ec6ff5b92574c20d2fcdc13aabc952c53f0237dc4c996a7a08790a7cde514e6d2b234ea634eca57b9a49991d4b9214d6a9fba468e6c1ff05e2b9c7add6b56d71283233c8830e767f42dc80c350ca6ee719040bed58800e8a3ccec38c61ee16e790ca07839f0da42bfa6d6b644d34ec375ab56fe855c6d57805fac4acd3954e59b4f3f8caae247a734212104e3ee697487ca173f66dcac4d75b94ac87052ef13add319fb2170d9c31f9071e600be09626df677d403940b3b13febad08ef6099fcfc3b11e63c05a3565b5e5c8662fccbb820228819af3f9bdc7da0546c627ee253e40f93f31076f57a5505af829b4097e4d9c02c7819d8794acdb18e36013008df9d9282642c82650562b99d05d9819c262a2ed4042689df3c3d32aa7ea6c70a803ea84aa84a265f0550c3229e19ec92f18f4813329826ba8217f875fa5025115ec2cd5d025509bc62688b742f198129747bee22fc76788c39d2cf5a4cdc2b5c153b451ba39b73800f9d851c0ca83ee56e569efeb24010c79356746bf7bf0d598f842786a1de60b97e30fce1b10472c0ca4e0bbed2529d7c106e6abdf8b4847c82040878149bc9f5212b74d912fcdcb860b8e19e646da61b92e19a0a14abd7f708d61259ab693330024aec176d705d6da5d9a586b3723abd62b515f40138428b95d59a1d485a7973bbdf0948ae1b8dc967c8ff51ed7738187cef0971ccc11d9f18e8f37ff2237eea28d640f7956312607279b8254b46b83f1b002d7b7ccd4262743ae00e97370242715cf205ff6c005852f2d19ab9f5e9ef1ad876bbc4cabc4c82e214a7f3c55a75b0124bc5c7a44b84ff4798af14424488ebe115abbe71f0f715e371a747703885bc06940906152ef09c177321683c06ee8889a701fb5df7ac1091a545329ee58c61ddef92b689d3e4038a288f6c63dd659c38f8a9b86672e3e9fd81d342e1c91dbfecee2e0ec2236c968610f5d095a95331efef003b0113c4492ac0643e7112d215004cff5749980f51bd45fbae713fac36fc0f99eb03bfb62298d16f34d7edadff74c66333e8d08b073748918a121f51cf508c914ddd0cc8a79867b269fa136a11830e697dac57437f806633b833d72f2a148348e6f5fd0f5cad8b9f6150e90e9a795cb3dd7899fa8396c2fabdd6d2debf12b05f687e4e543d6186c4aa30ea64441f87f8560562a125430e8cc1cc3ea44361a181c6f7ac2b2291c9fcdc96a749eaa47f1a85400e172143b875ced04f75c3eeb112b0cd1faf2f44621c6c8e9b0b3f4bac451be7f0e93b59a5d7de585968a45a52eae2dc9b32a6d1e72be4751f3fce27ac28c3398fe65fd71f7d4aba6d02ef8e473b0b3a1e39a7dca2b3914415b9f0b60cfba979e6821be82872a54e38a528896c44bf65a327937843e6d90f2bbddd32ddc09e5dc38a052d57a4c1d254fe1b6a32be18b765529010b05d2c5408407d43299e8e2a956c818837cb1f1016a64bac8d221554a4601992da119dec64d97a162bf1b94463a2e901343e129b0d4cc3b06e5eeb1f042fd01db40a54374a8dbec95b5f7af547b51c3cb3743ce34866544d9154ba74a47a8919c301af3fb7677b835836e5d9581ea5dbb7154394d5c349171ffbe8c7a2825102524facd112c1d1b5f4b07fb12671a100de1b11557eb5e3b5077110d73373cb5000999c38ce097bef1f1a8e2e609a793e81fc6d28fd0a21e3d36b9ab430a4cad17f67ee8340290983984d503a2bbb501bfd0af098329e4398b80759a126f714c02d5a118adb9a82181b22cd9249a6b2bc07b04ab775c7f5d6dc96261041ac87860199858bef14eb0a9941803b23fbd9a00580f2d5a739306c4465a0a1efdf9741ec753d31e22ba698ace56cad63f51e5f8e8882dc989bd6"}, &(0x7f00000007c0)=0x1008) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000002c0), 0x4) epoll_pwait(r0, &(0x7f00000020c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x1555555555555627, 0x10000, &(0x7f0000002140)={0x6}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000880)={r5, 0x0, 0x4, [0x7ff, 0x100000000, 0x3, 0x9]}, 0x10) [ 516.633211][ T419] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 516.633220][ T419] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 516.633240][ T419] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 516.633261][ T419] R10: 0000000000010000 R11: 0000000000000246 R12: 00007ff26b80f6d4 [ 516.633283][ T419] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000007 13:17:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) geteuid() mount$fuseblk(0x0, 0x0, 0x0, 0x20, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{}]}) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) madvise(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) fstat(r1, &(0x7f0000000040)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) geteuid() setuid(0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 13:17:48 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={'bridge_slave_1\x00', @ifru_names='ip6gretap0\x00'}) close(r0) 13:17:48 executing program 4 (fault-call:15 fault-nth:1): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) [ 516.943837][ T681] BTRFS error (device loop3): unsupported checksum algorithm 22813 13:17:48 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 517.018926][ T681] BTRFS error (device loop3): superblock checksum mismatch [ 517.049134][ T681] BTRFS error (device loop3): open_ctree failed 13:17:48 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1000000017000007002e2f666d6c6530"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:17:48 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x7, 0x1, 0x1f, 0xfffffffffffffff7, 0x7ff, 0x80, 0x6}, 0x0) [ 517.252385][ T987] FAULT_INJECTION: forcing a failure. [ 517.252385][ T987] name failslab, interval 1, probability 0, space 0, times 0 13:17:48 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='\ntrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 517.353876][ T987] CPU: 1 PID: 987 Comm: syz-executor.4 Not tainted 5.1.0-rc1-next-20190321 #8 [ 517.362781][ T987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.372855][ T987] Call Trace: [ 517.376168][ T987] dump_stack+0x172/0x1f0 [ 517.380531][ T987] should_fail.cold+0xa/0x15 [ 517.385146][ T987] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 517.390980][ T987] ? ___might_sleep+0x163/0x280 [ 517.395852][ T987] __should_failslab+0x121/0x190 [ 517.400806][ T987] ? shmem_destroy_callback+0xc0/0xc0 [ 517.406197][ T987] should_failslab+0x9/0x14 [ 517.410731][ T987] kmem_cache_alloc+0x2b2/0x6f0 [ 517.415598][ T987] ? __alloc_fd+0x430/0x530 [ 517.420117][ T987] ? shmem_destroy_callback+0xc0/0xc0 [ 517.425497][ T987] shmem_alloc_inode+0x1c/0x50 [ 517.425514][ T987] alloc_inode+0x66/0x190 [ 517.425530][ T987] new_inode_pseudo+0x19/0xf0 [ 517.425547][ T987] new_inode+0x1f/0x40 [ 517.425566][ T987] shmem_get_inode+0x84/0x780 [ 517.434658][ T987] __shmem_file_setup.part.0+0x7e/0x2b0 [ 517.434683][ T987] shmem_file_setup+0x66/0x90 [ 517.434722][ T987] __x64_sys_memfd_create+0x2a2/0x470 [ 517.434743][ T987] ? memfd_fcntl+0x1550/0x1550 [ 517.468476][ T987] ? do_syscall_64+0x26/0x610 [ 517.473166][ T987] ? lockdep_hardirqs_on+0x418/0x5d0 [ 517.478463][ T987] ? trace_hardirqs_on+0x67/0x230 [ 517.483533][ T987] do_syscall_64+0x103/0x610 [ 517.488165][ T987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.494066][ T987] RIP: 0033:0x458209 [ 517.497975][ T987] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.518111][ T987] RSP: 002b:00007ff26b80ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 517.526535][ T987] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 517.534514][ T987] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 517.542496][ T987] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 13:17:49 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername(r0, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000340)=0xfffffffffffffe84) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x0, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8200) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000180)={0x0, 0x2, 'client0\x00', 0x1, "8713b2d24eb7ba71", "10f019a59762acb25e4d771c861bcefbce932d3d02b3783cf8956d10cdec5329", 0x80000000, 0x6}) getsockopt$inet6_int(r0, 0x29, 0xce, &(0x7f0000000080), 0xffffffffffffffff) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f0000000240)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r4, 0x111, 0x2, 0x1, 0x4) [ 517.550512][ T987] R10: 0000000000010000 R11: 0000000000000246 R12: 00007ff26b80f6d4 [ 517.558490][ T987] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000007 13:17:49 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) bind$packet(r1, &(0x7f00000002c0)={0x11, 0x5, r2, 0x1, 0x2e, 0x6, @random="13e5bb0a3e8d"}, 0x14) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:17:49 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:49 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:49 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x4000) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000040)={0x1, 0x80000000}, 0x2) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 13:17:49 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) setxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f0000000540)='security.ima\x00', &(0x7f0000000780)=@v1={0x2, "455e83c700343674a8bee6ff7e16bf8c286984"}, 0x14, 0x2) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:17:49 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x421}], 0x1) r2 = syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$TIOCEXCL(r3, 0x540c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) getsockopt$sock_buf(r4, 0x1, 0x37, &(0x7f0000000180)=""/23, &(0x7f0000000240)=0x17) write(r4, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2d, 0x10100) getpid() sendfile(r4, r5, 0x0, 0x16300) 13:17:49 executing program 2: r0 = socket$inet6(0xa, 0x80007, 0x8010008000000081) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x7, 0xfffffffffffffffd}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)={r2, 0x95, "f9d3eab8695538bd854db89972028f4f52b1a25ea79722787f931d4e8f448469873b330d235bcf68176a46ddd198233182175e978fc95b117c4b56355487b506bd2ce28beb6f58b22677616c38ec51609fab7b2c7839a377566b5a71261d7382ed7d3ab1125f0eb695b4200d6588791647e756b2f5b356341c0d4733f0a87dc0cbd44878651199fc74e9f5690dbae45d7542720b60"}, &(0x7f0000000280)=0x9d) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000002c0)={0x6}, 0x4) close(r0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xff, 0x40) faccessat(r3, &(0x7f0000000080)='./file0\x00', 0x10, 0x1000) 13:17:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='.trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 518.565999][ T27] audit: type=1800 audit(1553260669.997:52): pid=1602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17673 res=0 13:17:50 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) setxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='security.ima\x00', &(0x7f0000000340)=@md5={0x1, "3345b87cafca7b7a3d6871954230db36"}, 0x11, 0x1) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0xfffe}], 0x0, 0x0) [ 518.728170][ T27] audit: type=1804 audit(1553260670.047:53): pid=1602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir139523110/syzkaller.rRBEj3/453/file0" dev="sda1" ino=17673 res=1 13:17:50 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:17:50 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x401, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x526, 0x80400) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0, r2}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x24000, &(0x7f0000000740)="67cff36301cd2f101f062e27d03413c2852e219c6238f9165265", &(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000880)="5755ea328a0180d74c09211bb5b5af68dd487f622fb95c7040d25021db904c10afcc784b34f6bf") ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logo\x00\x00', &(0x7f0000000280)={'syz'}, 0x0, 0xfffffffffffffe2c, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1020681b457ada17f3d68f50d860247a75308f14b9102292e88ae0fb01cc87e230816b57296b870c23f37675f88980e5b1c5cef7329e037fca51eb5ba5ee8962f92e3960a4f68102a12e20cd9f627ad7e8f2a3dfabf00b50dc57f59cd1914755f5c4f5080000005bf600000000000000006649e7870fbd7bd6279e65afbf6782e9891a75b81150a4936a7f3db9042e5ebc106721453d5021d5b0a888ea7db43f23f44d27ecf00c1b15d6537b8219c7ed427cd015f3e36b5c9b4b945627a2dd37bb6b26864113d9ea499144440cf3550d3b076d3ca77f17ac709300000000000000000000000000"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) [ 519.003913][ T27] audit: type=1800 audit(1553260670.057:54): pid=1602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17673 res=0 13:17:50 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='/trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:17:50 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x240000, 0x0) ioctl$TIOCNXCL(r2, 0x540d) 13:17:51 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x76, 0x80000) accept4$inet(r2, &(0x7f0000000240)={0x2, 0x0, @local}, &(0x7f0000000280)=0x10, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x1, 0x8, 0x8, 0x4, 0x6, 0x5, 0x3, {0x0, @in6={{0xa, 0x4e21, 0x6, @mcast1, 0x5f}}, 0x40000000000, 0x2, 0x0, 0x7fff, 0xb74}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000001c0)={r4, 0x81}, 0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f00009b2000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$VT_WAITACTIVE(r9, 0x5607) 13:17:51 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="103032abde41fb62040adb51cacaf5f33c72d0807ed9d06d4826ae03b3f621ebaa38315692d141ea17f4b22fe10c845a58e758"], 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000140)={0x4, 0x7, 0x443a, 0xcec, 'syz1\x00', 0xffff}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:51 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@empty, 0x7, 0x2, 0xff, 0x0, 0x2, 0xffff}, 0x20) ioctl(r0, 0x3, &(0x7f0000000080)="4adc0562ae1bcfd4738bbec090be30fdddcd03af6424fba16b36ebb6c84d2b57f41c6b671e") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xd8, &(0x7f0000000200)=[@in6={0xa, 0x4e21, 0x3, @loopback, 0x3f}, @in6={0xa, 0x4e24, 0x100000000, @dev={0xfe, 0x80, [], 0x1f}, 0xffffffffffff24e6}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x80000001, @ipv4={[], [], @loopback}, 0x100}, @in6={0xa, 0x4e22, 0x2ba2, @dev={0xfe, 0x80, [], 0x1b}, 0x4}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x1f}, 0x5e92}, @in6={0xa, 0x4e24, 0xffffffff, @local, 0x6}]}, &(0x7f00000000c0)=0x10) r3 = shmget(0x1, 0x4000, 0x78000000, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r2, 0x10000}, &(0x7f0000000140)=0x8) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000040)={0x3e, 0xfffffffffffffbff, 0x1, 0x5, 0x0, 0x26, 0x1a, "36399d399d6b22a7ba36546dd8baab7602e94dec", "b5981107029ac2500731a541e6e090b5e658d8cf"}) 13:17:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='b\nrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:51 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) ioctl(r2, 0xffffffffffffffff, &(0x7f0000000780)="6da296d0405282dce142e487a822e7109e01808c3c1c77705edeaacf9f242fe606257d07fe9122f1acb261ee2d0bb2f5b10e3220aa1d8d6a64f56af6afdc4c75cd7639c7d3e25c72909ff4f9b2f275baad343619abe61c2e86d512d488a65c70648b4db61a0f9797e0") keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001766696c6530000000000010"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:51 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:51 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000000c0)={0x2, 0x9, 0x7f, 0xe07, 0x1, 0x186c00000000000}) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x4, {0x11fb, 0x5, "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", 0xda, 0x1, 0xfffffffffffffff9, 0x6, 0x1, 0x3, 0x2, 0x1}, r5}}, 0x128) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1000000017020007002e2fff00000030"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:51 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000780)=""/127) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:51 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000080)={0x8001005, 0x5, 0x3}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:17:51 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x20000) sendmsg$nl_xfrm(r1, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x444}, 0x1, 0x0, 0x0, 0x1}, 0x8080) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_int(r0, 0x10d, 0x2, 0x0, &(0x7f0000000000)=0x3271) 13:17:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0xb8) close(r0) 13:17:52 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='b/rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000540)={'syz', 0x2}, &(0x7f0000000780)="4cd040a2a835ffa868e2820a6e171f86847646821f7fe15eff6891e79f42f827be6cc65e803f8aac98ae283664e235525b561d1c4d940742bdbda8d7117599a93bb85fdbfa6e3229237d1a9e660919cbdec1e6fa10e13f00e3570d220e", 0x5d, r5) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:52 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) time(&(0x7f0000000140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000200)='bdevwlan0^cgroup$\x00', 0xffffffffffffffff}, 0x30) ptrace$cont(0x7, r3, 0x0, 0x4) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r6 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r7 = request_key(&(0x7f0000000780)='blacklist\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000007c0)='/dev/btrfs-control\x00', r6) r8 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r7, 0x0, r8}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:52 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x80) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400100, 0x0) ioctl$TCFLSH(r1, 0x540b, 0xa9) r2 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) close(r2) 13:17:52 executing program 0: syz_emit_ethernet(0x13e, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) rt_sigreturn() 13:17:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x6) r2 = add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r3 = request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='cgroup+*cgroup\x00', 0xfffffffffffffff8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000000c0)='rxrpc_s\x00', &(0x7f00000001c0)=@chain={'key_or_keyring:', r3, ':chain\x00'}) readahead(r0, 0x8, 0x6) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x10000) close(r0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1000, 0x20, 0x1f, 0x10000}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r4, 0x6}, &(0x7f0000000300)=0x8) [ 521.444466][ T2874] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop5 new:/dev/loop4 13:17:53 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x4002000, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(0x0, 0x0, 0x301800) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_cache\x00') getcwd(&(0x7f0000000180)=""/60, 0x3c) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRESDEC]], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) preadv(r2, &(0x7f00000017c0), 0x1b1, 0x400000000074) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) bind$x25(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e3a66698f65302c776f726b66696c6531"]) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000340)={r3}) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0x8) rmdir(&(0x7f0000000000)='./file0/file0\x00') poll(0x0, 0x0, 0x3) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x20000000000, 0x0) [ 521.551443][ T2749] BTRFS error (device loop5): unsupported checksum algorithm 22813 13:17:53 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x32, 0x28c600) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x85ef, 0x5, 0x1, &(0x7f0000ffe000/0x1000)=nil, 0xbe55}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r1, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x4a) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000780)={0x6, 0xd1f0, 0x1}) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000a40)='$Xy\f\xd4\xfc\xc9\x02,\xd5\xc8\x0f\xd5\xc8\"\x05\xf1\x1b/Mu\xc7#-\"\xbe\xf1\xf0[\xc2\x1b\x13\xffw\xf2\xe6\xe4\xa3\xbcHl\xc0\xc0q\xf9\xcck\xcb48\x83\x89\xe4T\xf4\xa0Cs\xdd\x91\xfdd\xc1#\xf0\x03\xa1\xd3F\x0f\xad`\x98?O\x88\xbbi\xae\x14\x9d\x9epp\xae\x9a\xd5\xb7:-x\rf\xf6\xe6\xb9\xcb\xef\xc5AVJ\xbb$\x8b\xea\xf0qe\xd1\xca\bn\xaf\x03y\xee\xb6\xf1\x12M\xaaSS6\x0e2\xf5c\xa1K\x00\x00\xa0\xf4\x9a\x15\xef\xb32K\vA3p\xe4g\xfe\x85h\xca-/\xbd\xb9\xeb\x12\xe5\xaaG\f9\xeal<\xe6\x1ej\xc7\xe9\x1f\x047q\xf3~W\xf00\x01\xae\xbd\xb5Rb7\xdbB\xb7\x1b5\x9f{\'\xb2\xee3', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) lsetxattr$security_smack_entry(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000380)='security.SMACK64IPIN\x00', &(0x7f0000000740)='\x00', 0x1, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r5, &(0x7f0000000a00)=ANY=[@ANYRESDEC=r1], 0x14) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 521.617221][ T2749] BTRFS error (device loop5): superblock checksum mismatch 13:17:53 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='b{rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 521.677203][ T2749] BTRFS error (device loop5): open_ctree failed 13:17:53 executing program 2: socket$inet6(0xa, 0xa, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) socket$can_bcm(0x1d, 0x2, 0x2) 13:17:53 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfc', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:53 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r1, 0x10000}, &(0x7f0000000100)=0x8) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}], 0x10) close(r0) 13:17:53 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000540)={0x8}, 0x4) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) syz_open_dev$admmidi(&(0x7f0000000780)='/dev/admmidi#\x00', 0x1, 0x40) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) accept$nfc_llcp(r2, 0x0, &(0x7f0000000280)) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000540)={'syz', 0x2}, &(0x7f0000000780)="4cd040a2a835ffa868e2820a6e171f86847646821f7fe15eff6891e79f42f827be6cc65e803f8aac98ae283664e235525b561d1c4d940742bdbda8d7117599a93bb85fdbfa6e3229237d1a9e660919cbdec1e6fa10e13f00e3570d220e", 0x5d, r5) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) [ 522.201987][ T3043] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 522.231480][ T3043] BTRFS error (device loop4): superblock checksum mismatch 13:17:53 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1a8) close(r0) 13:17:53 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='b\x8arfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 522.318748][ T3043] BTRFS error (device loop4): open_ctree failed 13:17:53 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfd', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:54 executing program 2: r0 = socket$inet6(0xa, 0x7ffff, 0x8011000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:17:54 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) io_setup(0xcd7, &(0x7f0000000780)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000cc0)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000dc0)=0xe8) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000a00)='./file0/file0\x00', 0x1, 0x3, &(0x7f0000000c40)=[{&(0x7f0000000a80)="db8d1050a6bb12febe15a8fd6ec1e1552ed2a22123b7379ad8196dee3a57f80ee7e6a6581111a693a635cd0b9609af7048f6990a71abbe84a5953c09f8879be7bd37600677c6c82230923e46e5227d980b2b7b", 0x53}, {&(0x7f0000000b00)="ffef18465fb5e364a1ff165eb98f598e3e90a04331d3d8fad85474030ad9887517743ff4cc429214a7a78796dc1f45db70bce8f5a3875a216fd5a8359d7c9e99aa45e4923f91a7a641d2f5d85db29bd6c270e0f8da71869b9db88d21136f6218952b6111f9e5f4b6fc018464e6d16ff333b00e84298e29da03c0835030652d0b4852d9fcceac4108039e3395dc12809cbcd60f26d7776f0cf5bc99ad9066caddcaa7b7772b53b775a144d176b78a50827e6a6fc6f0a20a15bb885e0cb2f8b889046d3ec50c9c7ab9bd9392888802a247c87067280dea203491f9ac", 0xdb, 0x6}, {&(0x7f0000000c00)="0b96aaa40a5e38cd7b5512bd0a0e5f6939ba2b30a3fa4122", 0x18}], 0x5000, &(0x7f0000000e00)={[{@nobarrier='nobarrier'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x6}}, {@flushoncommit='flushoncommit'}, {@noflushoncommit='noflushoncommit'}, {@treelog='treelog'}, {@notreelog='notreelog'}, {@thread_pool={'thread_pool', 0x3d, 0xd8a0}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, 'vmnet0vboxnet1'}}, {@context={'context', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vmnet0-'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@permit_directio='permit_directio'}, {@audit='audit'}]}) io_pgetevents(r1, 0x800, 0x1, &(0x7f00000007c0)=[{}], &(0x7f0000000880)={0x77359400}, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r3, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000140)=""/61, &(0x7f0000000300)=0x3d) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000f00)=0x80) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 522.711187][ T3351] BTRFS error (device loop5): unsupported checksum algorithm 22813 13:17:54 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='bt\nfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 522.766283][ T3351] BTRFS error (device loop5): superblock checksum mismatch [ 522.786400][ T3351] BTRFS error (device loop5): open_ctree failed 13:17:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000540)={'syz', 0x2}, &(0x7f0000000780)="4cd040a2a835ffa868e2820a6e171f86847646821f7fe15eff6891e79f42f827be6cc65e803f8aac98ae283664e235525b561d1c4d940742bdbda8d7117599a93bb85fdbfa6e3229237d1a9e660919cbdec1e6fa10e13f00e3570d220e", 0x5d, r5) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:54 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xf6', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:17:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bind$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, {0x3, 0x401, 0x20f, 0x0, 0x200, 0x81}, 0x788}, 0xa) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:17:54 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, 0x0) request_key(&(0x7f00000007c0)='pkcs7_test\x00', 0x0, &(0x7f00000002c0)='/det/btrfs-control\x00', r5) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:17:54 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfe', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:54 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) ioctl(r0, 0xff, &(0x7f0000000140)="d4421b7e0a447535ea1a152f1247afdd4b640da2ca06d6dd1e746e37bb") r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000, 0x0) 13:17:54 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='bt%fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000540)={'syz', 0x2}, &(0x7f0000000780)="4cd040a2a835ffa868e2820a6e171f86847646821f7fe15eff6891e79f42f827be6cc65e803f8aac98ae283664e235525b561d1c4d940742bdbda8d7117599a93bb85fdbfa6e3229237d1a9e660919cbdec1e6fa10e13f00e3570d220e", 0x5d, r5) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:54 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0xfffffda5, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x101401, 0x80) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000080)=r1) [ 523.566995][ T4152] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 523.641506][ T4152] BTRFS error (device loop4): superblock checksum mismatch [ 523.696157][ T4152] BTRFS error (device loop4): open_ctree failed 13:17:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='bt/fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000280)={0x0, @speck128}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hwrng\x00', 0x90800, 0x0) sendto$unix(r5, &(0x7f0000000780)="5aa1c5dd579c76125503faa604a6f6f3ab73bd31aec44bd6fce30925e7a6d38aac0ab85a5b09c973a24375853dad7d0094fb1445762cb01ddc2b006af37361113baeb25563b5943d53194e2bfd0e9cee74acd2802192b482cda20c36bc1f06ade2df760fb202589b", 0x68, 0x0, &(0x7f00000009c0)=@file={0x1, './file0\x00'}, 0x6e) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:55 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x8, 0x7, 0x401, 0x1194, 0xc0}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0xc000000000000000, 0x7, 0x4, 0x81, 0x1c75, 0x7fff, 0xafc4, 0xffffffffffffffff, r2}, 0x20) close(r0) [ 523.913283][ T4366] BTRFS error (device loop4): unsupported checksum algorithm 22813 13:17:55 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) [ 524.031240][ T4366] BTRFS error (device loop4): superblock checksum mismatch [ 524.142915][ T4366] BTRFS error (device loop4): open_ctree failed 13:17:55 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001380)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000013c0)={@mcast1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}, @ipv4={[], [], @loopback}, 0x3f, 0x1000, 0x10001, 0x100, 0x20, 0x120, r2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x20000, 0x0) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f0000000100)=0x4) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=""/40, &(0x7f0000000080)=0x28) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000180)={0x36735a3d5be3d0ac, 0x3, 0xfffffffffffffff8, 0x3, 0x2}) close(r0) socket$inet_udp(0x2, 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) 13:17:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0xffffffffffffff03, './file0'}}, 0x22c) 13:17:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x7f, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='bt\x8afs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:56 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1ff, 0x200380) recvfrom$unix(r2, &(0x7f0000000080)=""/8, 0x8, 0x2, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x4, @mcast2, 0x6}, @in6={0xa, 0x4e22, 0x20, @remote, 0x7f}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e21, 0x2, @rand_addr="a1d85418433ec56620dbecf473fb622c", 0x1ff}], 0x84) 13:17:56 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x32, 0x28c600) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x85ef, 0x5, 0x1, &(0x7f0000ffe000/0x1000)=nil, 0xbe55}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r1, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x4a) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000780)={0x6, 0xd1f0, 0x1}) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000a40)='$Xy\f\xd4\xfc\xc9\x02,\xd5\xc8\x0f\xd5\xc8\"\x05\xf1\x1b/Mu\xc7#-\"\xbe\xf1\xf0[\xc2\x1b\x13\xffw\xf2\xe6\xe4\xa3\xbcHl\xc0\xc0q\xf9\xcck\xcb48\x83\x89\xe4T\xf4\xa0Cs\xdd\x91\xfdd\xc1#\xf0\x03\xa1\xd3F\x0f\xad`\x98?O\x88\xbbi\xae\x14\x9d\x9epp\xae\x9a\xd5\xb7:-x\rf\xf6\xe6\xb9\xcb\xef\xc5AVJ\xbb$\x8b\xea\xf0qe\xd1\xca\bn\xaf\x03y\xee\xb6\xf1\x12M\xaaSS6\x0e2\xf5c\xa1K\x00\x00\xa0\xf4\x9a\x15\xef\xb32K\vA3p\xe4g\xfe\x85h\xca-/\xbd\xb9\xeb\x12\xe5\xaaG\f9\xeal<\xe6\x1ej\xc7\xe9\x1f\x047q\xf3~W\xf00\x01\xae\xbd\xb5Rb7\xdbB\xb7\x1b5\x9f{\'\xb2\xee3', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) lsetxattr$security_smack_entry(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000380)='security.SMACK64IPIN\x00', &(0x7f0000000740)='\x00', 0x1, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r5, &(0x7f0000000a00)=ANY=[@ANYRESDEC=r1], 0x14) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000780)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1000000017020007002e2f66696c6553"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) epoll_pwait(r2, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x6, 0x200, &(0x7f0000000140)={0x8}, 0x8) 13:17:56 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:56 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:56 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000, 0x0) write$P9_RCREATE(r0, &(0x7f00000002c0)={0x18, 0x73, 0x2, {{0x1, 0x0, 0x5}, 0x8}}, 0x18) r1 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x4, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x2c, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x3, @remote, 0x1f}, @in={0x2, 0x4e22, @remote}]}, &(0x7f00000000c0)=0x10) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000340)=[0x3, 0x439, 0x10001], 0x3, 0xd236, 0x8, 0x0, 0x3a, 0xe9f, {0x1f, 0x4, 0x100, 0x100, 0x80000001, 0x10000, 0x7ff, 0x3ff, 0x1, 0x3, 0x5, 0x9, 0x8, 0x5, "742842c68c3dab1b470369a2aa4d945ecc19fb208d58186e91aa6db14d248ec3"}}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40080, 0x0) io_setup(0x8000, &(0x7f0000000100)=0x0) io_cancel(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xf, 0x4, r4, &(0x7f0000000140)="c06fec1269dcf58f39c1c747f52abd6be313920afa4860c5412bb26570b074002dcb3f7168c077f2c7964775", 0x2c, 0x20, 0x0, 0x2, r4}, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000200)={r3, 0x2}, &(0x7f0000000240)=0x8) 13:17:56 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x400, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000009c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000a00)=0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000a40)={r3, 0x81}, &(0x7f0000000a80)=0x8) r5 = dup2(r1, 0xffffffffffffffff) r6 = semget$private(0x0, 0x6, 0x0) mknodat(r0, &(0x7f0000000280)='./file0\x00', 0x88, 0xffffffff) semtimedop(r6, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) add_key(&(0x7f00000007c0)='big_key\x00', &(0x7f0000000880)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r8 = request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffffb) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r7, 0x84, 0x1e, &(0x7f0000000540)=0xc8, 0x4) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r5, &(0x7f0000000740)=ANY=[@ANYPTR=&(0x7f0000000ac0)=ANY=[@ANYRESOCT=r2, @ANYRESOCT=r8, @ANYBLOB="c480aacc5f25b0bf4a66e506bbc22233b9aac0807f6c78b62cddccf879286eefb401a1eb931bc1c88734e06bb90a9a6f5ee4a68718159b7cc2391bf04b6cd9df0a7c68780496fd3b64ada0ef49c3b442c5c3ad856904112ffcf8f3cbf6c53f90d9310405a6bebac6e99d9951232e987985e13f03f31c41b8817adbba3b87ec7a27adf51ed569c611ae24f6569b3deffe4f670da96c9874543225260a73a2c8ed4703ebf6635609ad53d59abe5c9195b47988d503f8b04517786e165228bb5e8741", @ANYBLOB="ef94b430b00728ae6d02eb6e39e819a17fb4c08358b80dca6cd9b71248226d5bf6ef165c7ce6fd4001f738006d75942121675295dc83bd9f5707039c7984361df55aae52e8e69bb1cdab9515c22f731d2e70615f71a0ca9b9bf9163c81e5a7ce1d6ee02589acfe5eadfbf510fbeabec1f141fda13f96e7e3c45578ab409346991f81ef63819f3c27415f072424f4a53bcd6dc447d3d6612054bfd386f1d0aa70c267d11301", @ANYRES16=r4]], 0x8) ioctl$DRM_IOCTL_INFO_BUFS(r5, 0xc0106418, &(0x7f0000000780)={0x7f, 0xd2f, 0x9c, 0x80000000, 0x2, 0x8}) ioctl$TIOCLINUX4(r5, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) [ 525.123159][ T4889] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 525.153730][ T4889] BTRFS error (device loop4): superblock checksum mismatch [ 525.202940][ T4889] BTRFS error (device loop4): open_ctree failed 13:17:56 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x32, 0x28c600) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x85ef, 0x5, 0x1, &(0x7f0000ffe000/0x1000)=nil, 0xbe55}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r1, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x4a) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000780)={0x6, 0xd1f0, 0x1}) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000a40)='$Xy\f\xd4\xfc\xc9\x02,\xd5\xc8\x0f\xd5\xc8\"\x05\xf1\x1b/Mu\xc7#-\"\xbe\xf1\xf0[\xc2\x1b\x13\xffw\xf2\xe6\xe4\xa3\xbcHl\xc0\xc0q\xf9\xcck\xcb48\x83\x89\xe4T\xf4\xa0Cs\xdd\x91\xfdd\xc1#\xf0\x03\xa1\xd3F\x0f\xad`\x98?O\x88\xbbi\xae\x14\x9d\x9epp\xae\x9a\xd5\xb7:-x\rf\xf6\xe6\xb9\xcb\xef\xc5AVJ\xbb$\x8b\xea\xf0qe\xd1\xca\bn\xaf\x03y\xee\xb6\xf1\x12M\xaaSS6\x0e2\xf5c\xa1K\x00\x00\xa0\xf4\x9a\x15\xef\xb32K\vA3p\xe4g\xfe\x85h\xca-/\xbd\xb9\xeb\x12\xe5\xaaG\f9\xeal<\xe6\x1ej\xc7\xe9\x1f\x047q\xf3~W\xf00\x01\xae\xbd\xb5Rb7\xdbB\xb7\x1b5\x9f{\'\xb2\xee3', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) lsetxattr$security_smack_entry(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000380)='security.SMACK64IPIN\x00', &(0x7f0000000740)='\x00', 0x1, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r5, &(0x7f0000000a00)=ANY=[@ANYRESDEC=r1], 0x14) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:56 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:17:56 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0x2, 0x3}) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) prctl$PR_GET_TIMERSLACK(0x1e) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000a00)={0xffffffff, {{0xa, 0x4e20, 0x8, @local, 0x9}}, {{0xa, 0x4e22, 0x8, @mcast1, 0x7}}}, 0x108) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:56 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x800000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000080)={0x6, 0x0, 0x7399, 0x7, 'syz0\x00', 0x5}) [ 525.737317][ T5209] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 525.770008][ T5209] BTRFS error (device loop4): superblock checksum mismatch 13:17:57 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) getuid() r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 525.795708][ T5209] BTRFS error (device loop4): open_ctree failed 13:17:57 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf\n\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:57 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x4, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x200000, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f00000007c0)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0xfffffffffffffe9d, r5) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) r7 = getpid() ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000540)) sched_setparam(r7, &(0x7f0000000280)=0x2) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f00000009c0)) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000780)={'syz', 0x1}, &(0x7f0000000a80)="4c56afecb04001e5fe86c6cada4191d7f3bbf7f622febe7a7520e445bf8410033c159f9790fdab4692a536e4a43a062d96740463209aca5f45bd76389b667c652603d5247b441c5978a4b10ba1b376558f8806bccae12c21cca4cec104607e2d0faeb9dd1de277f38d30b25129dc3a1efdf0cd7eb919835614a46da63e", 0x7d, r6) 13:17:57 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x32, 0x28c600) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x85ef, 0x5, 0x1, &(0x7f0000ffe000/0x1000)=nil, 0xbe55}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r1, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x4a) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000780)={0x6, 0xd1f0, 0x1}) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000a40)='$Xy\f\xd4\xfc\xc9\x02,\xd5\xc8\x0f\xd5\xc8\"\x05\xf1\x1b/Mu\xc7#-\"\xbe\xf1\xf0[\xc2\x1b\x13\xffw\xf2\xe6\xe4\xa3\xbcHl\xc0\xc0q\xf9\xcck\xcb48\x83\x89\xe4T\xf4\xa0Cs\xdd\x91\xfdd\xc1#\xf0\x03\xa1\xd3F\x0f\xad`\x98?O\x88\xbbi\xae\x14\x9d\x9epp\xae\x9a\xd5\xb7:-x\rf\xf6\xe6\xb9\xcb\xef\xc5AVJ\xbb$\x8b\xea\xf0qe\xd1\xca\bn\xaf\x03y\xee\xb6\xf1\x12M\xaaSS6\x0e2\xf5c\xa1K\x00\x00\xa0\xf4\x9a\x15\xef\xb32K\vA3p\xe4g\xfe\x85h\xca-/\xbd\xb9\xeb\x12\xe5\xaaG\f9\xeal<\xe6\x1ej\xc7\xe9\x1f\x047q\xf3~W\xf00\x01\xae\xbd\xb5Rb7\xdbB\xb7\x1b5\x9f{\'\xb2\xee3', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) lsetxattr$security_smack_entry(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000380)='security.SMACK64IPIN\x00', &(0x7f0000000740)='\x00', 0x1, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r5, &(0x7f0000000a00)=ANY=[@ANYRESDEC=r1], 0x14) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:57 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:57 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) ptrace$getsig(0x4202, r2, 0x8, &(0x7f0000000300)) dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$tipc(r0, &(0x7f0000000f40)={&(0x7f0000000880)=@name={0x1e, 0x2, 0x3, {{0x41, 0x2}}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000b40)="82bdc1fb9523606a56cf84f1e6ef0f1f78a7367f223b7d16dccb707edeb26efde809a7bf923a7278667d2f9cdc9bd2726b53b930d7ff58acaecb5c57e0f4e3dc312bbe3692b69356a08483948e5134556b2bc1545bde479ad3eb21f8734803187addd6c40db556a274c25d65646c2c79c64a573825a1940b49cea04d211cff13ba0aa62ca83a7c1edfa79ebb547a4e67b92164379bf6d814127c9dff30a347f0254a0062273d0d1dcb97231e52c4da7f208c133e2d9e69e470765bf86edf417c9ec9462665be86c0b5c55c69", 0xcc}, {&(0x7f0000000c40)="8840f6b6e069118ca7d1f33a59351c70db78ea158196e8d9a7f94b8c83b1bda73b58ff589133c32832511b4ffc7f766c0e80a41f6df6a56ca96a09291ad2c32383b779932dfad16485ba44dc247fd4f844d1652e3d7fc92f986d6ec20d82eb2a2d04f70f6473dd2251b315ed7aa4f0bb3d628fc30da4754208", 0x79}, {&(0x7f0000000cc0)="ab76454e92b30c8c509d50c4420208619c8ba23331e8e0efc404f665004d47bb74fc3876e1909674ce145c6a229cb188478fc7093db126a4389677b18a32f03874d81e81b1262f375f20f906c9c04a2da4fbc7e2fe1af7ec2d7241da98784234afac6de84c05fa0e77b49896382445dfd85c11c3d52175625282", 0x7a}, {&(0x7f0000000d40)="8c31892a8dced903cf7721cbb39bc102e86e380f4a164ca91e16403dfc", 0x1d}, {&(0x7f0000000d80)="a73b5bd792dcaf887a314781f889586ef14a9b3a593110b830c2eadb7c0def2958606f190de9cd86775ca4d051ed545b28b5c7b75c9fa0554e1ae0768fb6a7533b71fdc58eb67978a4d70b2be6c3429a6a4e4f3b28f26967ddad102bdcaf8617e1e77de6ca1942a1b5ef2eed20aaa60d42d2c46fc30611d05074072274fdba1b1287f9488b9ac1abd81e5f1100810c42cbbdc599276a365eea3755060987d5d0a0cb4e65e2623974906b577c37ee2460558e471868bbfab3dce466c915b44fa64e43dfbcf52f1c4d2adc4c470bbadbae839a3aa8f8af866329", 0xd9}], 0x5, &(0x7f0000000f00)="0a3a0afa82ab4345888b891f79ae88f31650abeb2c7eab468ce1930e75a4c9052fbaa0a987298d89997d05ca", 0x2c, 0x800}, 0x4051) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000740)={0x0, 0xff}, &(0x7f00000007c0)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000a80)={r7, @in={{0x2, 0x4e24, @multicast1}}}, 0x84) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000a00)=ANY=[], 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000780)) perf_event_open(&(0x7f0000001040)={0x5, 0x70, 0x7, 0x67, 0x54b1, 0x7, 0x0, 0x5, 0x2000, 0x8, 0x8, 0xffffffffffff0001, 0x8, 0xfffffffffffffffb, 0x52, 0x9, 0x8001, 0x40, 0x0, 0xff, 0x0, 0x100, 0x0, 0x0, 0xee, 0x2, 0x20, 0xffffffffffffffff, 0xff, 0x3ff, 0x10001, 0x400, 0x81, 0x9, 0x7fff, 0x81, 0x80000000, 0xf65, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0x488, 0x7f, 0x1, 0x9, 0x2, 0x9b, 0xfff}, r2, 0x5, 0xffffffffffffff9c, 0x8) semtimedop(r3, &(0x7f0000000f80)=[{0x1, 0xffffffffffff6aa0, 0x1000}, {0x7, 0x7fff, 0x800}, {0x3, 0xd60, 0x1800}, {0x6, 0x10001, 0x1800}, {0x2, 0x5af80000000000, 0x800}, {0x0, 0xfffffffffffffff9, 0x800}], 0x6, &(0x7f0000000fc0)={0x0, 0x989680}) 13:17:57 executing program 2: socket$inet6(0xa, 0x80003, 0x8010000000000084) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 526.281348][ T5530] BTRFS error (device loop4): unsupported checksum algorithm 22813 13:17:57 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:57 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="100000001700696c65309be5c3842f82bb6bb128e6a212b56e0a8a7d71f50ac57ab971da4593cc91d2faec1e3dc5476acd84a35a62a97c714459c9881c00000000"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f0000000280)) [ 526.358609][ T5530] BTRFS error (device loop4): superblock checksum mismatch 13:17:57 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:57 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x54, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xaa45}, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x11}, 0x4}, @in6={0xa, 0x4e20, 0x10001, @dev={0xfe, 0x80, [], 0x21}, 0x2}]}, &(0x7f0000000240)=0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={r2, 0x5}, &(0x7f0000000080)=0xfffffffffffffe52) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x2, 0x6aab}, &(0x7f0000000100)=0x18) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x12000, 0x0) [ 526.413074][ T5530] BTRFS error (device loop4): open_ctree failed 13:17:57 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1f00000000000000, 0x0) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x10011, &(0x7f0000000240)='/dev/vcsa#\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000100)={0x3, 0x0, 0x2, 0x9c0}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000140)={r3, 0x99}) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x2271, &(0x7f0000000000)) [ 526.630906][ T5795] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 526.676204][ T5530] cgroup: fork rejected by pids controller in /syz4 13:17:58 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 526.760932][ T5795] BTRFS error (device loop4): superblock checksum mismatch 13:17:58 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_QUERY(0x18, r5, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000540)) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:17:58 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) close(r0) [ 526.833588][ T5795] BTRFS error (device loop4): open_ctree failed 13:17:58 executing program 0: getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000480)={'hsr0\x00', {0x2, 0x0, @empty}}) syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1394}, 0x4000) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980)={0x8, "7c70ee3800d5ab5f2036f872e0ac57cbd592bca0d671633f50a3102066d6e765f5a64731e3fb8d90d250eda2cc33b60a7ff98074cdc3f1dd1a2df26a381d95974e0925d521c6b48c3dee0d430d398884316091aff6adb6153dc3c92549957d3488efc02d6f6fb172524b095c30c1bd35aae04236bdd42694d613eb54c0b65a338c48dc4c8bad70754fc81d9928e4a1b81f9c77075258a0805b4494867247966b24a023311fd91ef3754b98d3acde6f2ef0617f123c22fccb81c11389fdfa2e21c2365aabfc8916e02151d8643ae21cab7fcbec6142186d3bb57546c106484bc4c28a48da2b75dd82aabe99464558e60cd101f6b65856fabee614d271741a68dd550c8772f06a93cf8e5c0de549c3b75a72f8a590bd50b2af5f64009c969ed7596f0192b0f98b1afac0e8c5f4c653f611b4a71776400a9ae3f18e75f856788c97195749042510735880b9bb0ccb23210832a4f1c6f134d68f8e299837c426e0c9a45d5d2c959446cc363f370c67cd01a063c91254d692fe35abee92fabda4f66d93228c979ebe036c5c2e0028ec76562d67d0919ca28258fec0ed60603142b5c57c4cfb1ea1e892d0fd2f33970142b179c415d6bea344fbcc82d133052e848a885160737c69eb02ca9f544831c8e3ffcf40cb7b415d24795fc8aaeb8e76bec262aea5e28fe5d6495c4b5895a612b1cc2122286add66356f3ecd309f970634f1b09da1507964d35575167317f13c7fd9f11af27ceea86e9a5b3494a27ba98ba38dd1fb72ef2c6163664fd8f7c946935cd4833121f505ff277c03d959d9a12f3389e9eb6701a8b29f72c20c6abb7bd8349dd2e120bdd59dca9f1a2a877f1677b59d7920ddf29b9d94f7c6879b78e31cf1b65b60fe349ef9d4976f46609ee34e33f647aafbf64f6323d18598905f2e73af75661397595b8f9c1e9a4e993946820da5378ca5b363560e95edce316e99bac6e6250efcf1cb58fdcf94c7557c2d7f763a688543462d54b64e178c2e64c6ebba356894973051907fd8de8ba908e822168b171c1707efcd9ac827e64313721876e2ff26ac34e88557a4a0dfde08eda81cf0c1465a89b68429e48966044c767563e1121db48c9b619fd7362afd15ec6aa19b28759d7977be4fbcad0cf8dd5dc5362259bd5cb5089a9d18db969afe1192571f5fcc0c4d6be281d23b9c1f9f32873c058adfa1bf57a3718686957edfd6e4b58aa959541127696d59fb2810d042ced227961eb19a424e4cf45bc6243217bb7561b7ee11f8c0b8f39480343a26f2da5fe79d5e213c01ea47155ffa91e7d7ba0bc8ccb018bd69cfe71dd8565a645d678b404a295397e83ae69dbf8505f6947a836b44823a92861124330fccd4bc4a2e20d9047bd919d82c89623caa87eb09bd584d58f42b35ef55fddc06dfb3957f3f507e5ca9b8b98947cc5bb68846755527ddf32ffa444e1c7a5654d4d377e04a9f22e1069804fdcdb251acb6bd6b32d100feb44286991d779d2b3e2b7f5cc5f8eb3ae166a3b6fb9df11e1867989a6f9b2028e4c73b4d418b51f6e870713cadafddb47a48c9a97283da214f02db3326d42438d9a7db580693ad1887f99d86bb5fafd6d07c2647fc80c2c5a1ed9ea3b95be65ca422080ddefca5b49ccd538f6bc67390f892d9e416f7e835f76dd90edc56256348d20560caeea05c0922cab60dbf0b57ddaaed6ded5a336e01485fd571dc12050461271cee347c31ac245bfee9128630dfcc43b6d88b5ba9937a6f6ab70b7d256784ff72297cfcfd0ffacd09b55fb832bf60f04d87c48c74972b9f18fa178ce4880b025d1c1097ddb929e8f7e02f1c0e03012bec0fa61a49eb1c2a50a45fc0d98b6649de325184006938e421321e8b366649d9b6ebadf77509c9d48844e80f7752fd7daaa5c938b946feaaac0d871203270a747035c7e2f697c84e792a55cbce76c0a25360f7acbeaab60627aa9c37064af75b67f46732844eb2f6b37226004afe451a9fbfbbcf7e72ade67b017e9209b5627fbe16789abd90326751a1fd1d93efc59f2650f979ba71938d784064922bee2874c4b76d5f26e39ea0a98cf175950137feff9456c88c6a295830183fae3a9c2312c25f3d81708d73488d15a587e7e7cdde3b77917eef29c8b5965c916a65c3c5a53b7313c3115d0a8bb4e16f6b80ff6f78adb756aba94ced86047562a2cd2fb25e9a4656f6359c3f2fde8b5ab38852853cbd7221cb4d59b7f0e79bd37f9ade073f62b75edbe63c13c0d02bf076d88f5b750ea640aad47ce97d6a0783398dd3fbb63734ed969470cf45200235650532224fc28caf1e36ca6b402ec4c978add40fc59f2113485875682139f8aa9aeb48d09178de919370b0cd0ebcab5e60e1b0a2fc153db0dae8e50b48561622a677d0f1afc149676f832e016e14007fb298dcb96f11a92a1ac8bd4cc7b34d659d6cd2c9817b586585e72080255b083bc84512277ffb7f561c6a7a08cd128bfe9b525da531f0bf04f11d3de102b3538835807ac0b2f4325fc6765d02d692ec82f5b338c8257029136fcd3427c09874ecc7492becdd6608eac4adf1abc3f7e08868a72e57ce4dcfc288a25af73d19f1118a9254963c1548cdca5fc7c921a7f218f8e71edd7969dfb35beae1091d7530e32236397fa9fcd232b441ff1b0177829468c198d659d247ccca4fbd58c625501e4368075d0e5e69a6f90952f5bbe48e85a303131dedf7f1a513b291598a545784e1013521877c25d6069d3a855652a4bad5b2df2e4da2de756a20e790b756dd2925ce824561e5892b5e064c7c7b996acc4e29597e0cd00956e9c57ec374714f846be7632d3075e38bead499163498810886c78a2cc73fb64fd48e186083ce911e0751b4dc63476859c2824fa532a4b1711c244619e702eeab19380aeb7b17f67fade3dcad8ddddd893a526cd5d04d8ae982c88029ec71bdd0772fd74adbdb378fc204ca411a2d8a50331516a28552be78f9725f32d1b3a6c7bdf3277c5f7e385c7ebbacc419ec7ca3c5b8f46dbefee59b6422a6b22d60527edc012f852077d925619874f7709f283e01678fed36528003a696ee431a817f34f453c143dc56b70e1f810a5380a555cc8c4fc6522ab544ce5d715caa302ebdd0aa8286b7ef5dd6dd48a8ad9566818f7509daf02db0b98b432f57f1d107ee95a86228728cab4062e27922381e1e2ee351af5e2ea0fd6d1cea70b3b8f4a50f0776fc9aa2a7d2dff6e1ea3769864104f09137b99960b69af13895d842649eacaed8ddf183beba3323640af8deb52b902c0974d685d19fc87c93eb80ad5d28e54363705ad39231d989522e94f000256bc8d93af138a45d67dad3e21fa9fb31d9327c6e71f61956d9daf4f97333112704136d3d1bf6fe0e4c002e10b684d2344300ec70fae0b50532ebace58f0e8318354a172cceacf27d01ff41cc8fef42443f62b0e15b5fcc0728630b96fb2c2b59634f4993bb1ce2eace6fb0f53e5f84bc5f58b1b66d59e3c75a98670496f105a703607211aa9e882e72f13e9fe07f0767ad4e5ac5c732b65301d8ceab36b5ff2f71958fb1b51d2e703ac506e68d4026160fd3f60440b8b8f554f1feeba5d53f71cbe60d143620f8fa779acb94c965b729207a5ab11f4a51b694c31606171da44a28d80cde296dff5724ff718d6377eb8534e616cff39af943ee4ce87b4fadded30c702d370a71072ab3e20f19b8c1b73fdbbb9c675352bb73ee85e22597fc0c439a33f5febe1629bd084af7193f8d1a1415b02ca54706711505cbae11ec6411b012cc3a3eddcfb002901b6e7565b9fbf4d605c147031888ceb590c14697d00970ce9095c6f7fee41ec6a15d7ef52dfedfff2a0d3dbb387b61232aee6ca202787038021e6aabda18e2adf6fd89aa491e65f9813d73412fbfff089752d713d7efa690ec4fc254b56908d3057f65997acf81aea589e272f8fa852849e488f1e0c0cb6cdb5f46ca92e36d39224e704850056d2e9b91909aed0f55d054e274415ecc39b8958335a14cfb0a42d7f26ef8e82592dfd03b3550b5193fba077994c682951968869574fd94976760d9bd9b334353eeda836cc8dab244e72095cc46833f02bb2f6df35601b3085664261abb67fc9ab9f27210e6827cd15ce16c55f0f7f5b8ab401f24032b19a53a9299b62ebf4a8cf7f4753d95126f008a8ce349036666de66bcaf40b27fa875efa98873e1ef9302e2a24bfe07bd1054bdf9ba9ad1b1075402f26d682833b947c762513ba5f07537bb712473184a60e04ace5adb8d982d6153b011ae0b2034adc0ff4a64e2c6561c2e0840cdab2120bc916cde9b7a92c4d332d0f83945fe55e3c8f4d93f22e7759c20241d92cca0ae5a3d06a127e5614df708cea1ad3b2f231c81460ff4c3f349c67a87135a4b67589ffce311832923f71796276e81f0537e265404c0ee06d5ed98a5ec5f8ad62db589eb585fc4627173b51fd4e897a3e8d2acbb82ec2996ac3a6823368a1e12a0536a9d1a7b2d31d80c46c292ff51395481d4f65c53fab867e27bec9156ee189d245d94877a1405dc9e1e996822ad47071a9ab36c9bfd02c41ea5ba21591793053b1b64758bae0addfcd69d169849bc1ee6ce5c08f0d3da5ecc1b6ab31e13af2fa5ce4d921163270901264a88ac6350e8fb6371663dd04146932238597258b123a8036250c190fbb3cfc6ebbf9e06c4a9053e8332c95c91a890a3d35ddd35f47e7ab606f3e345e12560e6d52243883da7b8910834042ad12e7fb3f08a0b14ef6aee22251999e6079be2ef5666d7d5ae00d161720262761da3f378c63cb151f4e94d034e9de949dfe796b905804ca555691023c30ea7cf0cb276e1e3ba65793291f8287d1064606bf5787421b9b9bfc05e9c5eac750de92519fe9e2592cd34a2ef6ec18efed5e7c13bfcfce47327cbecac358bbe6d44164849308cf91cd5ea87fa4b02ba4939e28141c7dad42714b019470d91808a8f46150677b6c90f267ecb39ef42afc95de0cbd016775c89d8213ec9d4e061e6493f237296f91abfc64176c0e885ef54af4136a724fadfe89a25d7599998acebc4a27f8fb5b26936bda5c3d5fec3373dcd9a0e99fc939641c50669adc54119582e8835575d1c57fa955cd29d870360620f91c3ff90d264013816352317ae226f7d7bad5db711f8973382f6cebd63cd519ddd08e1772649be75f64f4acc15f828dc0b305584b6dd2213194603c44e2964358d305aa97fb08568a0a955ad7a6f8d042754b4bbf2fb3414052719fd9841bef8360d1d3195c69414be882115c2c64fecdcbdaed3a2e943fdfef9a13520e41d32a787bcfe4f61e2b378d35aa70784a772cf8ebcaaeb105e4627516db2ababfcb8c11f224c3a48c86160d34d0ee59f02c31648ae4b0309b378f0bf63266967dcfb4f1cc1902f613c6d0d48915a9cf28a52b106544cde1b38ff2e2a1275fd0d3899ce7f7c6653c9017f7ac4aaa35bcb2811a8f9dbb56746b45475350e7c13d42abb5692377da7a4045ee644ce00f8699e3251d75621c82cd659ea3add277affe3ff792f7d24a3d0979ef82cfc0d409697ae2e8598854a8327f46974c901d309dc6dbe31913c59d821aa50c0fe95cc822e8f07bbb00e9a09bc9a570b9778d29308740bc336a41258d209c206f87a709aa43415da0096f7d177e509a7d625645fb098ccc45367d82235e952670ac5f82f8ced3f59fd9ee20ac75be609cc832417e807ddc40630cba4c91e0785edcb5f20b9e6dedb1ec172cd16fc034f410e9ce375ea855144aa3076317f649cf4efe4d7abf244984c4e", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000080)='./bus\x00', 0x200) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f0000000500)) ioctl$RTC_VL_CLR(r1, 0x7014) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x40800, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) unlink(&(0x7f00000002c0)='./bus\x00') mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) sendfile(r2, r2, &(0x7f00000000c0), 0x808100000000) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 13:17:58 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:58 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000140)) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1000000017020007002ec55d8b6c6510"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) add_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000780)="e43c0a12c37c1aed2a0fea7812b247beca", 0x11, 0x0) 13:17:58 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x101, 0x20000) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000000c0)={0x6, 0x0, 0x8001, 0x42b, 'syz0\x00', 0x3ff}) ioctl$CAPI_GET_PROFILE(r2, 0xc0404309, &(0x7f0000000080)=0x6) 13:17:58 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r1, 0xc) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000280)=0x200) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:17:58 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:58 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 527.474042][ T6063] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 527.493911][ T6063] BTRFS error (device loop4): superblock checksum mismatch [ 527.544307][ T6063] BTRFS error (device loop4): open_ctree failed 13:17:59 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x5) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:17:59 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x10000) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10001, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) semget$private(0x0, 0x4, 0x80) 13:17:59 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 527.865629][ T6520] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 527.890674][ T6520] BTRFS error (device loop4): superblock checksum mismatch 13:17:59 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 527.952856][ T6520] BTRFS error (device loop4): open_ctree failed 13:17:59 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) writev(r1, &(0x7f0000002e80)=[{&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000000140)="15bd4eb68e4e24bb9ad7016e", 0xc}, {&(0x7f0000001a00)="1492e32c708eaf56e427e90cd872cd4ef56c4e756fba69534c8eff3017dd19bb656ab6ce927743b780f16c3682cc28512b2286c7463adfb79d7a3c6b0f00ae33d70609260424291d3bf1d062a183741aff5e9ac18c2b0c272f1f7684e12ba9f9618ff162b6a4c3d36e7762639d24ed86e296f1757ff7346be59e0989df5e3e07dde9e2f8d696c926c46681c5c2c8f998ca1ffce914c3b762402198ac557893f586446350a7b03de6ce16f306bbdf84c2f891de6f64761a5fb7310198faaccb5d9d2b91286b41ba", 0xc7}, {&(0x7f0000000300)="3d31292d54cea30103e3a2e33fbbb69a0a964d313333e7ec5cc77cf0f21ee3d10465ba32018e827eaeb4f99140b830d1a574272dad3e8c85fb6dc80c3dc228c059cdbd0fdc6fd1aaafa43e85edda89da6987bab4ab0e136a62c8aa6399ec2d85", 0x60}, {&(0x7f0000001b00)="b85dbfe8fe5ea75ca9420f84d1a9a335a2fa6cefee86a59e4327f28a48b9e4451714306170cb9faae5dc56aa5af7f1948a70e98fec2f5159750223586aa59a5a59cfbc0e126d4fd6e8fc8890b0c4d7273800bdc82e2eba0a1d7ece92f0063a884d6d6ede7807a1f015a754158ae3813e873eeee822fe6d0f599450655fba2a40e93ead1409d1b3f8d886907942a830d716624739ced5cf0e54bf5c30c505757b02082f60bbce09336222", 0xaa}, {&(0x7f0000001bc0)="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", 0x1000}, {&(0x7f0000002bc0)="cc1531ca688ca4c1fd1c59b8fd1a4c343bb48a595bf09450b4f87fa630de2afa16c6c287e9d236e4150b8d4cbc12fa3dc9b9e50bb7c37c1fe3a07c1018c1f6cdfc686560e01073478bc160535e67a381cc48afd3d33d92f40abc011ac381662ca17c3288dee7975b1edb3ddd2a516b62a0e0f20741a5f3d3ba54d7882d8bcdc55661103cff7c73fdc35b85d32bc588e25243d23d8bf8b466dec8e5862377c7082d80ba99501ee934b92264c585594242a4a9a6b1098b28ce4072e991792d461f1163104dc2516c1b114a877b20958f3461ce23eee8dab84f4bb42a9ea8d384c7bbe63862", 0xe4}, {&(0x7f0000002cc0)="abf558a769714df6e7242663142c5c4fc5a61f1c368dbe3654ae815d88f594b2476aed16ebbecaf4c29cd67c8f60ebd5d972c17de10782d2e9f9819007f88d5dcce414d398b2d33cb146f4b8b87f8cd96deb90d998dcd701b01ca53cd2b46e92ab656b5ba4655b92cebec11ccdefe2b7ff6549d5c12f4436a654f004e157bd068ac98dfd195cd90e61a4a640d9d4914130f774f00778bce2c87ab20e00310dddb615a3da9409710bafad58af8b9a0e04e094ca488e3fec37c4293124decb83f9c536828580916d2efe69bb6a32d2b225134717c77ada8da8334bb4cd6964786da4f8e382229a3d55d187a87d14ee299cdbe2d541ace7de1384e4", 0xfa}, {&(0x7f0000002dc0)="9b7361128b7f909f4005627e32134bf686c20be73882fc95890f95bf97651ee714cd4c63220d8622b8b0fbff6deed55603c275212e984614841bb82ad7f0175b5f366e6258c50334e29a289cd7777f6c74c835531e3240d9afe121b906b9652f2bf4d82a6be972a0893546a4959fa71b837802244b440038f6493f5ee4ef8b845a94a3b51cbf01d3db7c79715bdf4a60d2ec0dba8348332ef787d32427662e2aab", 0xa1}], 0x9) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) write$P9_RWRITE(r0, &(0x7f0000000780)={0xb, 0x77, 0x1, 0xffff}, 0xb) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:17:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000080)=0x6000) 13:17:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000c916, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) write$selinux_attr(r2, &(0x7f0000000140)='system_u:object_r:traceroute_exec_t:s0\x00', 0x27) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000080)) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000000301ffff0000000000000000000000000800150000000800000000000b43e52f72d1eef2dbb76407f118481763b37d3abee321eb53dc36aa182ad80d0b1c09deba72f265e95e9677a0ba15064f7774cbcebc7e65ca06eb0105e969e6dea090870b87c44061646e00fb7a85a8ca1b0cd97a446b39b7d138c164e1784b4120587ce6efd8ac1d4c8b246777e43911fcc0b32455deea00e9f8759e12a7884b386f385249e65e4df057151e84b75d40ffff41df62bb526be9a285c65ac397e118c2351b2fed37e025d6658587550cdb008cf6560f271e4025a9", @ANYRES32=0x0], 0x24}}, 0x0) 13:17:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000340)={0xa9}, 0x4) sendto$ax25(r1, &(0x7f0000000440)="76bde1bcb6af51ccab8aab3c600d3d458801d1a1dbefb2006e7fa1bd49b6cb6cf75ae369f03ae2e4996735c785f02648bbd246dcd065282da88734c9940e89e43bd98298e264d249df3070bf0c926a228c80242c3c40721c451c20927e9ca4651083c4d5b498bf8f5d56b97a6abdf1f95e2d5d8a511fec2a655fbe83dcc6a32bb934cf596b2bb85b300a85a830288425", 0x3c0, 0x0, &(0x7f0000000380)={{0x3, @default}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000080)={0x0, @bt={0x3, 0x3f, 0x1, 0x1, 0x100000000, 0x9, 0x9, 0x7, 0x7f, 0xa2, 0x1, 0x3, 0x0, 0x7, 0x8, 0x2}}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e24, @empty}], 0x10) close(r2) socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x8, 0x3, 0x1, 0x1, &(0x7f0000000140)=[{}, {}, {}]}) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000400)=0x1) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) [ 528.380326][ T6701] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 528.406189][ T6471] BTRFS error (device loop5): unsupported checksum algorithm 22813 13:17:59 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:17:59 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) [ 528.506762][ T6471] BTRFS error (device loop5): superblock checksum mismatch [ 528.600493][ T6471] BTRFS error (device loop5): open_ctree failed 13:18:00 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x4, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000a00)='/dev/btrfs-control\x00\xf7\x1b]x\x04\x827\x9dI\x02\xf7\x9a\xcfz\x9cCH\x1aj\x0eD\xee\x84\xf5\xf2\xcbF\xefI\x14=\xbb\x0e\x0eWK\'\xf8\xcfk\xb0\xadg\x02\xab2\x98\xe4|\x90b&_6g\xa8lqp\xc1e\xc7\xb7i\xca\x99O\xd9?\xdap\x06\xb3\x16\a\r\x8f\xfe\xed\xad\x9c\x15p\xf7\xc4\n\x9dH\x81\xee\xcbR:h=\x17\'r\xf2(\x9c\xb06\xc0=\x9c\x8d\xd5\f\x9e\xffO\xfe\xcf\rb}<\x98\xa7p\xdd\x87k\xb6\x14g\xa9\x13O\x1a\xf8\xfb\xde\x005\x18\x86\xb9\x16\x82c\xac\afa\xe4\x82\x0f\xd9\x90Tot*\xac\xc5\x9b\xb2\'\xa5\xc9F\xe0i\xcd\x91\x8bz\xba\x7fI\x88\x1f\xff_\xbe\x03\xeb\f\xdc5a\x7f\xebo/m\x15v\x99\xa1\bU\xades\xf3\xeb\xe7B\xed/\xb9\xf2\xceV\xe1\xe5\x0138\x19\x19\xdf\x1f\xad\xb7\x85xa\xe7\x15\x1d\x9d\x83\x1b\"\x17Q\xbe2r4VZ\x92-\xb26\x1aN\xe8\xce\xfc\xc94\xdf\xa9qR\f\xbb\xd9w\xb6M\xec,\x8a\xc2\xf3\x11\xba\\\xb5\"\xe8A\x91\x7fP\xfa#\x11X>u\xbbv\x17\xda[\x9b\x05\xb9\xde\x8cn\xaf\xae\x0ei\xfb#=\xed\x1c\xec\ra\xca\xd3dt!\xb9\x17\xaf\x04\xe2#~\x8b\x94B\xbb*\x7f\xf6\xe8Y\xa84\xeb\x97\xec\x964N\x93\x15\x0f\xc2`\xf1\x97!E\x06wKi \x7fO;\x83>\xdc\xd1\x17#\x0f\x97\xff\x9d{\xa0\xdf\xe1\x94qW.8<\xa5\xcfW\xb5\xdf\x92*\xc1DK\xc0\\\xacb\xfbF\xbd\x984F8\x9czs\x97*\x119\xa7!\xa3\xb1j\xe5\x94\xf7\xce\x05`S`V\xac\xad\xa8Z%\xc1\xbcd`\xac\xfeQ\xe2_\xd8', 0xfffffffffffffff8) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000bc0)={0x7, @output={0x1000, 0x0, {0x72f5}, 0x40, 0x1}}) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, r4) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1066696c653000000000000000000000"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x2000000000008) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0xf) times(&(0x7f0000000040)) close(r0) 13:18:00 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:00 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) write$P9_RLINK(r0, &(0x7f0000000280)={0x7, 0x47, 0x2}, 0x7) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000040)={0x17, 0x27, 0x16, 0xb, 0xa, 0xffff, 0x5, 0x53, 0x1}) 13:18:00 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:00 executing program 0: socket(0x80000000024, 0x2, 0x0) [ 529.153931][ T6876] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 529.211967][ T6876] BTRFS error (device loop4): superblock checksum mismatch 13:18:00 executing program 2: r0 = socket$inet6(0xa, 0x800, 0x5) r1 = socket$inet6_sctp(0xa, 0x10000040000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 529.315781][ T6876] BTRFS error (device loop4): open_ctree failed 13:18:00 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)='{\x00', 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) setresuid(r1, r1, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) 13:18:00 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x80000000000000, 0xaf, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:00 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:01 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_int(r1, 0x0, 0x2f, &(0x7f00000000c0)=0x5, 0x4) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) symlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0xfeb3) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000a80)={0x6, &(0x7f0000000a40)=[{}, {}, {}, {}, {}, {}]}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r3, &(0x7f0000000740)=ANY=[@ANYRESOCT=r5, @ANYRESDEC=r1, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16, @ANYRESDEC=r3, @ANYRES64=r1], @ANYRESHEX=r3], 0x57) write$binfmt_elf32(r3, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0xd1) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000880)={0x4, &(0x7f00000007c0)=[{0x0, 0x2, 0x1}, {0x100000000, 0xd6, 0x8, 0xfffffffffffff785}, {0x8, 0xaf5, 0x54, 0x5}, {0x400, 0x9, 0x6, 0x4}]}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x33, 0x48000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 529.712403][ T7303] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 529.768508][ T7303] BTRFS error (device loop5): superblock checksum mismatch 13:18:01 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x7, 0x40, 0x200, 0x80000001, 0x15, 0x8, 0x9, 0xdb6, 0x7, 0x966a}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$llc_int(r1, 0x10c, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) accept$packet(r2, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f0000000080)=ANY=[@ANYBLOB="04b5fe0000000000009e7c0fb9fa23b6572703565a923e560636abd88d8db3d78e6ed04791224e906d6d192d94dd000000397d8b"]) [ 529.819816][ T7303] BTRFS error (device loop5): open_ctree failed 13:18:01 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000a00)={0x4, 0x1, 0x4, 0x0, 0x0, [{r2, 0x0, 0x1000}, {r0}, {r0, 0x0, 0x401}, {r1, 0x0, 0x180000000}]}) dup2(r2, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000ac0)={0x0, 0x800000000, 0x2, 0xb7, 0x7, [{0x2, 0x6, 0x8, 0x0, 0x0, 0x404}, {0xc5, 0xde, 0x1, 0x0, 0x0, 0x1004}, {0x1, 0xfff, 0x0, 0x0, 0x0, 0x2088}, {0x7f, 0x0, 0x7, 0x0, 0x0, 0x8}, {0x1c8, 0x2, 0x7fffffff, 0x0, 0x0, 0x80}, {0x2, 0xfff, 0x9, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1}]}) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x80000001, 0x9}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000780)={0x0, 0x3}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000880)={r7, 0x6dce}, &(0x7f0000000c80)=0x8) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:01 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) shutdown(r0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000280)={0x3, 0x200, 0x4, 0x2, 0x1}) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:01 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 530.254212][ T7663] BTRFS error (device loop4): unsupported checksum algorithm 22813 13:18:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000040)=@hopopts={0x7e, 0x16, [], [@generic={0xff, 0x77, "d08060e5220112762ce21267446d57d4c05c4bf3c991382e9e2a1391d3d75a073be23263a860512ad7359a86a17a37a14b7e93edba790b3b559dde57aecd582bcaf89c31a8bf96b01adfdc2928dd9c8395fa201687f4518f165b05707421096dba0b03ca71e4258ec2b291c8bbb948883fd155905b6a3d"}, @generic={0x6, 0x2b, "3d72db7fc70991d72b9e7c41ed7d4d6f509b2ecad96dc6e4854734be92b8c698f8bd2f94ad66e8b6fb01f4"}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xffffffff}, @pad1, @enc_lim={0x4, 0x1, 0x5}]}, 0xc0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x400, @empty, 0x8}], 0x1c) recvmmsg(r1, &(0x7f0000002800)=[{{&(0x7f0000000140), 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/189, 0xbd}, {&(0x7f0000000000)=""/27, 0x1b}], 0x2}, 0xfff}, {{&(0x7f00000002c0)=@nfc_llcp, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/136, 0x88}, {&(0x7f0000000400)=""/64, 0x40}, {&(0x7f0000000440)=""/192, 0xc0}, {&(0x7f0000000500)=""/109, 0x6d}, {&(0x7f0000000580)=""/100, 0x64}, {&(0x7f0000000600)=""/210, 0xd2}], 0x6}, 0x69828c9}, {{&(0x7f0000000780)=@ll, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000800)=""/24, 0x18}, {&(0x7f0000000840)=""/106, 0x6a}, {&(0x7f00000008c0)=""/43, 0x2b}, {&(0x7f0000000900)=""/71, 0x47}, {&(0x7f0000000980)=""/15, 0xf}, {&(0x7f00000009c0)=""/10, 0xa}, {&(0x7f0000000a00)=""/88, 0x58}], 0x7, &(0x7f0000000b00)=""/83, 0x53}, 0x1}, {{&(0x7f0000000b80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000c00)=""/251, 0xfb}, {&(0x7f0000000d00)=""/157, 0x9d}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/8, 0x8}], 0x4, &(0x7f0000001e40)=""/223, 0xdf}, 0xc5d}, {{&(0x7f0000001f40), 0x80, &(0x7f0000002280)=[{&(0x7f0000001fc0)=""/138, 0x8a}, {&(0x7f0000002080)=""/217, 0xd9}, {&(0x7f0000002180)=""/254, 0xfe}], 0x3, &(0x7f00000022c0)=""/157, 0x9d}, 0x80000001}, {{&(0x7f0000002380)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002400)=""/37, 0x25}, {&(0x7f0000002440)=""/208, 0xd0}, {&(0x7f0000002540)=""/99, 0x63}, {&(0x7f00000025c0)=""/168, 0xa8}, {&(0x7f0000002680)=""/29, 0x1d}], 0x5, &(0x7f0000002740)=""/175, 0xaf}, 0x8001}], 0x6, 0x10120, &(0x7f0000002980)={0x0, 0x989680}) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000029c0)=0x2, 0x4) close(r0) [ 530.310722][ T7663] BTRFS error (device loop4): superblock checksum mismatch [ 530.331878][ T7663] BTRFS error (device loop4): open_ctree failed 13:18:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = dup2(r0, r0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000021400090500000000000000de000a0000", @ANYRES32=r3, @ANYBLOB="14000200fe80000600000000000000b3000000aa"], 0x2c}}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 13:18:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0xfffffd6c) close(r0) [ 530.610130][ T7864] BTRFS error (device loop5): unsupported checksum algorithm 22813 13:18:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 530.651575][ T7864] BTRFS error (device loop5): superblock checksum mismatch [ 530.673956][ T7864] BTRFS error (device loop5): open_ctree failed 13:18:02 executing program 2: socket$inet6(0xa, 0x80003, 0x8010000000000084) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000040)={@mcast2}, &(0x7f0000000080)=0x14) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000), 0x0) get_thread_area(&(0x7f00000000c0)={0x3ff, 0x20000800, 0x1000, 0x3, 0x3, 0x9, 0x3, 0x8, 0x2, 0x2}) close(r0) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xc, 0x4010, r1, 0x0) 13:18:02 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x4000240005, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xffffffff80000000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x13, 0x4) 13:18:02 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:02 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x3b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) r4 = msgget$private(0x0, 0x261) msgctl$IPC_INFO(r4, 0x3, &(0x7f00000009c0)=""/180) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xfffffffffffffe17, 0x17, 0xfffffffffffffffe, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) shutdown(r0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000280)={0x3, 0x200, 0x4, 0x2, 0x1}) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) [ 531.258288][ T8344] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 531.296861][ T8348] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop4 new:/dev/loop5 [ 531.354984][ T8344] BTRFS error (device loop4): superblock checksum mismatch 13:18:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x5a2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 531.474204][ T8344] BTRFS error (device loop4): open_ctree failed 13:18:03 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:03 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x8010000000000084) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:03 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x3, 0x0, 0x1000}, {0x0, 0x9}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RMKNOD(r4, &(0x7f0000000280)={0x14, 0x13, 0x1, {0x14, 0x0, 0x4}}, 0x14) write$P9_RREADLINK(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="10ebff0017000007002e2f66696c6530cb1329e02e957021db9aeab645747b20332858d1e8b9129d532dfc1a831d85a6ea8ce4a01ce46b3b"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:03 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) shutdown(r0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000280)={0x3, 0x200, 0x4, 0x2, 0x1}) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:03 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000300)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="100000000a562f66697c653000000000"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:03 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:03 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:03 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000280), &(0x7f0000000540)=0xc) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:03 executing program 2: socket$inet6(0xa, 0x80003, 0x8010000000000084) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8000, 0x0) write$UHID_INPUT(r1, &(0x7f0000000080)={0x8, "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", 0x1000}, 0x1006) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:03 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) shutdown(r0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000280)={0x3, 0x200, 0x4, 0x2, 0x1}) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:03 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x240005, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x13f, 0xb}}, 0x20) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x2) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) fchmod(r0, 0x20) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="a993186e100014dc1702e5d5c13f2f66"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:04 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:04 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xb62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r4, 0xbf, "bf5a0d", "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"}}, 0x110) keyctl$assume_authority(0x10, r3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:04 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x5, 0x0) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000540)) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) [ 532.910560][ T9303] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 532.931902][ T9303] BTRFS error (device loop4): superblock checksum mismatch 13:18:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 532.970177][ T9303] BTRFS error (device loop4): open_ctree failed 13:18:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x880, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x8a500, 0x0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000180)={0x22bb3aad7b5fdc99, @output={0x1000, 0x1, {0x1, 0x7}, 0x8001, 0x8}}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) r3 = getpgrp(0x0) tgkill(r2, r3, 0x21) socket$key(0xf, 0x3, 0x2) 13:18:04 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:04 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x3, @local, 0x7}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @multicast1}], 0x3c) close(r0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20840, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x11}) 13:18:04 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:04 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000780)=@assoc_value={r5}, 0x8) r6 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000a00)={{0x0, 0x7, 0x3, 0x0, 'syz1\x00', 0x5}, 0x0, 0x130, 0x2, r6, 0x5, 0x7, 'syz1\x00', &(0x7f00000007c0)=['bdev\'keyring-\x00', 'btrfs\x00', '*@self\x00', '{\x00', 'syz'], 0x20, [], [0x80000000, 0x4, 0xffffffffffffe97c, 0xffff]}) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000880)={0x0, r7}, 0x5c) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f0000000140)=0x9) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r8 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r9 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r8, 0x0, r9}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r3, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x190) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:05 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x32083, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x4e23, @rand_addr=0x7fffffff}, {0x1, @random="3b0d48e83ccb"}, 0x20, {0x2, 0x4e24, @remote}, 'lapb0\x00'}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:05 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)={0x100, 0x8, 0x0, 0x6}) 13:18:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x240005, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x13f, 0xb}}, 0x20) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x2) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) fchmod(r0, 0x20) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="a993186e100014dc1702e5d5c13f2f66"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:05 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x40100, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000300)={0x5, 0x7f}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket(0x2, 0x807, 0x2) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x14c, r4, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffd5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc6}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}]}, @TIPC_NLA_NET={0x6c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa60000000}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x40001}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) waitid(0x0, r5, 0x0, 0x8, &(0x7f0000000380)) close(r0) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) 13:18:05 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:05 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="d136b54d0300000075a34a9d4e064ab592d3f317a7f3ad1000000017000007002e2f66696c6530"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) [ 534.198528][T10086] BTRFS error (device loop4): unsupported checksum algorithm 22813 13:18:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x240005, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x13f, 0xb}}, 0x20) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x2) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) fchmod(r0, 0x20) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="a993186e100014dc1702e5d5c13f2f66"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 534.247041][T10086] BTRFS error (device loop4): superblock checksum mismatch 13:18:05 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) [ 534.352290][T10086] BTRFS error (device loop4): open_ctree failed 13:18:05 executing program 2: r0 = socket$inet6(0xa, 0x80103, 0xfffffffffffffffd) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xffff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x673}, &(0x7f0000000100)=0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000180)={0x1, 0x0, 0xffff, 0x4, 0x40, 0x1, 0x7}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e21, @rand_addr=0x8001}], 0x3a7) close(r0) 13:18:06 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000780)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000007c0)='trusted.overlay.redirect\x00', &(0x7f0000000880)='./file0\x00', 0x8, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r1, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000300)={{0xa, 0x4e22, 0x6, @remote}, {0xa, 0x4e20, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}, 0x40}, 0x5, [0x2, 0x365b0af0, 0xffffffff, 0x7, 0x7a, 0x401, 0x100000001, 0x2]}, 0x5c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, 0xffffffffffffffff) unlink(&(0x7f0000000140)='./file0\x00') r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r1, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:06 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x0) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f0000000180), 0x4) pipe(&(0x7f00000001c0)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) geteuid() mount$fuseblk(0x0, 0x0, &(0x7f00000000c0)='fuseblk\x00', 0x0, 0x0) getpeername$inet6(r5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) 13:18:06 executing program 2: r0 = socket$inet6(0xa, 0xa, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$netlink(0x10, 0x3, 0xe) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x28001010}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="675c000000f20000df250200000008000100000000003ce8b8889b01e2434a8587ba127b8173186f83a208c96af462"], 0x1c}}, 0x20040010) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:06 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x240005, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x13f, 0xb}}, 0x20) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x2) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) fchmod(r0, 0x20) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="a993186e100014dc1702e5d5c13f2f66"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:06 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1000000017000007002e2f66696c6530d045f1722698c0e310a35f91014e25273d10ff1c8eb2070bbff3f83dd3ad0de778539ccd6c7f2366fbd9079def9970de9078dbe800b4762181de3ae3c442ea4091bb57919945623d99bd52a68d14de5306de1e3d942a79b4572b34780eb7ba9af8582cdd2eba829d9750d76da9dacf78ba8ede728cb90a471ac0f7b229e81195e0a7dfabc4ed3224f04be3d0579edc5205bfafe54705bdbc5f1be135c55a1f4f74430dc725d229fe233f13875315317d63a7ee1f3018b1e277a0c77a1e56cee7d63443bbd358990c9d4d83ee9523a0010079ab0b473bcb745a3022edb1000000000000000000"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) ioctl$sock_netdev_private(r2, 0x89fc, &(0x7f0000000ac0)="3c66058085ab754c6981514f122162fdeac36abdaf71b0688aa8bd5423fc4b7f69ace2b243b10cce2f4381548e19d482b59a752db8ed64827d12f6bb7f1074e5a6e35fcbf3401cbf70b3ef1f751b81ec176748cdeb66ae0e55b927906d6960b5539a48a511d8d64095bae723b9e9dfc49ed45ff2f97b9c64995d1545d062437375054e7ac86cf1de8d5ec22802c0a140f0b7165d72a6b53d0cf420efd121705decefacd302c25965f37547dc6e4c946812fff76972a28915e92d550297fbd7544ef1") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:06 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x12100, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 13:18:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf\x8a\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:06 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x1, 0x4) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000c00)=ANY=[@ANYBLOB="0800002017107a8400749ecdb1d9ef944292ab4e46dd1472ff0f3cc7bfda2b7c31a37500c4908b806e8133f8e398fe2a80da0000000000000000000000000000d5e50a44c78c0994eff80b2192b7e3944e2e15c24569cb1e9b3a9f6beeb7a8c2be8738d8d6a9a8e1d0aa49cae204eac2bb0251dc5c737f78ac373da6031d35e391a4323b5082f8110f604666b82489c5cd98925eae97e4495ac35a3f63efec595d88bd23df31b2e63a11c75b729093ca211024b069d440df6e3e947a9e8e4635658ac89cfebbe20cbd0672e3a40818ecbdbee231ebb4bfb710968859e87d7725447b9ab38c448f2b087c7fd55fcf16f958b1002313189a19ffa8cdb3316ca795bf32e9259019e57a49430472f2118d753b7f9b84c644502f652787496e9cec309e0e9fca16fe038be5a6e3d14b3d071d9457e2d0cf35351d21e51bf0c5f2e8519f8f62ca42c95533c897cf13a562171fa48b46378a40a4e157ee197e9e877523bad8175bbc9961fc03951c3a993647c0146cb02b2cc6739c18c5c1de08f09fd1bf94c575940e517abca450db464774564f47d19f5fc211fd3aca8dc0792fc5c055f1f537dbe7c0bbe365ca3bfd642f4ef1699e8b58b319b7063414ea7df38f664ddc67e9703f4311ece562aaab66f179d4598161901b2a7432153f68fb9eed5a0d113fff94ef"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:06 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0xc0, "8a6deb4f4ef2414c15d8d4686a53e3c4ee5b3ef47d937a1ec41e00eef413f57cf293f2ce9e4d7202f236083b1185f1a6c709f32b516aacf6011b832d69dc51cd94fcd3613cbbbc1b6d02835b4637662a1659a5c861b7126dc2a8f2b79d400ef762921301ed6c11f3eed1cc9ccc6d459c505fdd73e0bcd779b52319b52522604c624bef5aa224e06a99b592fb3ef8f57e2079bdcd25bb1a767e1b3f1da73fe2ec202dab5a3739f82b74024aa0537d7731f7004bae0dae36080114870cc4cc7876"}, &(0x7f0000000140)=0xe4) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 13:18:07 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x480002, 0x0) semget$private(0x0, 0x6, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) write$P9_RLINK(r0, &(0x7f00000003c0)={0x7, 0x47, 0x2}, 0x7) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xffffffffffffff7d, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r2, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3c4) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000780)=@assoc_value={r5}, 0x8) r6 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000a00)={{0x0, 0x7, 0x3, 0x0, 'syz1\x00', 0x5}, 0x0, 0x130, 0x2, r6, 0x5, 0x7, 'syz1\x00', &(0x7f00000007c0)=['bdev\'keyring-\x00', 'btrfs\x00', '*@self\x00', '{\x00', 'syz'], 0x20, [], [0x80000000, 0x4, 0xffffffffffffe97c, 0xffff]}) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000880)={0x0, r7}, 0x5c) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f0000000140)=0x9) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r8 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r9 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r8, 0x0, r9}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r3, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x190) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:07 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000780)={'syz', 0x2}, &(0x7f0000000a00)="adcfbf190bb47ba29d17bf66c6b7e94f14190cdabd0ce7df16deac2717a46bcbea3ffe8e0bd8dbfd538e116136869fa4768cce67e9fade345a670097b05a927c34ab2eee294f684fa81b6aeb5df1638511360b3a282159b1d713113189a22814a3a9d096e487c2eb16e6b3620ef7099027989ae8a6e2ac5d6ac35600f0a5a89fa81947131564374d39da6e32e2f539839969163743b4f4752b81631d53d7b636361eb662b09b4f8fd844bc567e53a63af055471f75c3d31f747107d8810d9e7a91864185bfb511847dfc763d7ba14377c9c731ed3b3a7a5668bad5ae50ac338fe3aada9f8186b62d5a59f6d428db1b4571a021ea0d", 0xf5, 0xfffffffffffffff9) keyctl$revoke(0x3, r1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000340)={0xfffffd1d, 0x0, &(0x7f0000000140)}) 13:18:07 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrf\b\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}], 0x3d2) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000340)={r0}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000300)={0x0, 0x3}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000280)={r3, 0x9}, 0x8) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xece, 0x400000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x20}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000100)={r5, @in={{0x2, 0x4e23, @remote}}, 0x728, 0x1e8, 0x58d8, 0x5, 0x9}, &(0x7f00000001c0)=0x98) close(r0) 13:18:07 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 536.160523][T11627] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 536.205302][T11627] BTRFS error (device loop4): superblock checksum mismatch 13:18:07 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) vmsplice(r1, &(0x7f0000001d00)=[{&(0x7f00000019c0)="a4b557f34782eea11df631d109b243df2cda4a450edbafe39aa13815ece8fb8894b78053aac808c0bf9b8011034593f5ac13f1e2f6037ad4bd8f6b186f3c3a2b5871c5003d960940387354069d3a05196c0b780f9ec5309f051aab95066daff1db0022c1d5251cda272ec4af9e18a96e089b2438a6749cca99819abbaa7ea649b2849e04373561eea0f86c0bee6b989640bab3de65f645525e1ea3854b16d93d8abff5ecce8ee579c82739f59069db7ebd88fadec394c50847c6ef10", 0xbc}, {&(0x7f0000001a80)="7b7f125aa1f09cacba14fa946b2f26cc90f10f7710deb90ab5e4e63c395756f4743664ec8f689fc3d63b02c996494ae9da592236da3334951ebb2ac03cabd0096d7118e893e0eb6da3ac072687aacb94b7b50abded3cffa6842323f0eb312be0e79c11559b49258cc1b212e429cc834adce613d72c1757dcf87c3e8a6190c3883f891ef468b828779012b4649369764ef54454c3c9cd65f6324d4d6290cc6127c2bc7137689d54b4", 0xa8}, {&(0x7f0000001b40)="0f671c8cb7c71fb034b8d295990a4d89fc01417e3cb09b1e1ab2998fc89ec29d63f39326532da803dadcffcd243849888893b8faacb0a003d479adf6c7f4084b450f67e2fb1518e8c7284c599e156b22cde5206d5ddc59e0cca332a7a4e6bd43641dd176b740d1eb6f5e0ad3ce9be3d06a9eb716b3aa8c35edaaa40d609200349695aeb5bfc1b496bd72419e4830156c8ff274a275f74a5b9be030410cd553bbccc9d21df53cd46aafbf3cc192ea701865994aa7e41bdff4a72cad9b1170e207e1fc1253f60043f736dee5afcf50d56ff6380d70ec795910ff3d752b63cf5c197950", 0xe2}, {&(0x7f0000001c40)="e4a142b2352cf1a4db01f2cf1a265332f3ab9b480b4bbc0613287f1f6c431041549c07b746444c374f18d9f7fb4f17144c7e9f04df81da5558a5ce9b0046d474e9c48d0011b51464862d2eb5d230ce51ac9f6d031873090e5cab9e8f26cdbe1318bc1812733ede95cc0fb4e04c7d17d4d7153aa99c4d6833c5442fd26bfdcadc65787d187317cf713d6857fe0f9c78c06ac570f0a6946bc16f944fdc580950acf364401452", 0xa5}], 0x4, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0xc0, 0x0) sendmsg$rds(r2, &(0x7f0000001980)={&(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000180)=""/18, 0x12}, {&(0x7f00000001c0)=""/66, 0x42}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/93, 0x5d}, {&(0x7f00000012c0)=""/171, 0xab}, {&(0x7f0000001380)=""/20, 0x14}, {&(0x7f00000013c0)=""/126, 0x7e}, {&(0x7f0000001440)=""/126, 0x7e}], 0x8, &(0x7f00000017c0)=[@fadd={0x58, 0x114, 0x6, {{0x421, 0x6}, &(0x7f0000001540)=0x2, &(0x7f0000001580)=0x100000001, 0x9, 0x7, 0x401, 0x8, 0x8, 0x9}}, @mask_fadd={0x58, 0x114, 0x8, {{0x101, 0x1}, &(0x7f00000015c0)=0x400, &(0x7f0000001600)=0x6, 0x80000000, 0x1000, 0x1, 0x78, 0x22}}, @cswp={0x58, 0x114, 0x7, {{0x0, 0x10000}, &(0x7f0000001640)=0x100000000, &(0x7f0000001680)=0x3, 0x1, 0x2de, 0x639, 0x100, 0x28, 0x5}}, @cswp={0x58, 0x114, 0x7, {{0x6, 0x80}, &(0x7f00000016c0)=0x4, &(0x7f0000001700)=0x9, 0x7f, 0x3, 0x2, 0x4, 0xa}}, @mask_fadd={0x58, 0x114, 0x8, {{0xbf, 0x80}, &(0x7f0000001740)=0x9, &(0x7f0000001780)=0x8001, 0x5, 0x8, 0x3f, 0x1, 0x1, 0xffffffff}}], 0x1b8, 0x1}, 0x8000) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000040)=""/93, &(0x7f00000000c0)=0x5d) prctl$PR_GET_CHILD_SUBREAPER(0x25) [ 536.266716][T11627] BTRFS error (device loop4): open_ctree failed 13:18:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000780)=@assoc_value={r5}, 0x8) r6 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000a00)={{0x0, 0x7, 0x3, 0x0, 'syz1\x00', 0x5}, 0x0, 0x130, 0x2, r6, 0x5, 0x7, 'syz1\x00', &(0x7f00000007c0)=['bdev\'keyring-\x00', 'btrfs\x00', '*@self\x00', '{\x00', 'syz'], 0x20, [], [0x80000000, 0x4, 0xffffffffffffe97c, 0xffff]}) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000880)={0x0, r7}, 0x5c) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f0000000140)=0x9) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r8 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r9 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r8, 0x0, r9}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r3, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x190) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:08 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:08 executing program 2: socket$inet6(0xa, 0x80003, 0x8010000000000084) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x9, &(0x7f0000004380)=[{&(0x7f00000000c0)="7a98754f2e0ba05ce87ca6e4058395bf1738d52a570585e6b851f5571f41385206c72c652f869f7ea9860b539e064082f74a469b8fea33720a4a1ef91d562520c43217fc89d593219a9551e227797ae6bb0ae7fd69", 0x55, 0x3}, {&(0x7f0000000140)="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", 0x1000, 0xd18d}, {&(0x7f0000001140)="0c3f6f20dee10c2d835b5a4146bc", 0xe, 0x8}, {&(0x7f0000001180)="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", 0x1000, 0x1f}, {&(0x7f0000002180)="f3c208903521f08fea54a0241307f6a2409616be96767a7820bb29dd3307e163265f7b87912719574cb94882316a9bcad024bd510eea1e26c79bcb75262231c6687db1361a12bd7fd8e3d1ae927ec13e1a0b1052f13991042bd18d0a", 0x5c, 0x9}, {&(0x7f0000002200)="36fd2e81e707d642c7c064eac17acf379e2ad6b11cf31d1dd5234c2770bbf995609d7998d041938fff8ab59cd90c57bf918f5b402ac05f19d1bb07117f775633ee", 0x41, 0x5}, {&(0x7f0000002280)="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", 0x1000, 0x100000000}, {&(0x7f0000003280)="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", 0x1000, 0x7fff}, {&(0x7f0000004280)="d5aff6fb4e2e9cba22467bda4a583038f854bd9dfed6762efaee605436508716b613ad17cd6e5e824fe2bdd874070c4bf1ba6f128f5eba06110456afc4506e5be8e67623e33efe4edd7294f3c614553e0467be2e720db455ab615426a63fe1d52a07d65b5024760b43e7d77fa92e86f6ce258e32c3fa5a70b93499cdd9a122de478df0b8b119f38507754702a5df0ec432609a0c2a666c9645c2c7e69d209a02b0a16b56594eaf4029bf3df821ca1624bb8baff28a7bd36a36ff61c27f232f5623effe24812a50975373573a4350ad99e0479f1b213523c2302d5872cdb50fdaf7cf561ecffaabef52f07771dd", 0xed, 0x6}], 0x2000, &(0x7f0000004480)='\x00') r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:08 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x595080, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000780)={0x0, 0x0, {0x17, 0x15, 0x12, 0x11, 0x0, 0x8, 0x3, 0x9e, 0x1}}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r1, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800), 0x0, &(0x7f0000000540)={0x77359400}) r5 = creat(&(0x7f0000000280)='./file0\x00', 0xa) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000007c0)=0xfffffffffffffff7) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r1, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) socket$inet6_sctp(0xa, 0x1, 0x84) close(r0) 13:18:08 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x20000000010) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) fremovexattr(r1, &(0x7f0000000140)=@known='security.apparmor\x00') r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000300)={@dev={0xac, 0x14, 0x14, 0xb}, @loopback, @broadcast}, 0xc) r7 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="10000c348038e455ffc8e0a35c594341"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:08 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x1) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000780)=@assoc_value={r5}, 0x8) r6 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000a00)={{0x0, 0x7, 0x3, 0x0, 'syz1\x00', 0x5}, 0x0, 0x130, 0x2, r6, 0x5, 0x7, 'syz1\x00', &(0x7f00000007c0)=['bdev\'keyring-\x00', 'btrfs\x00', '*@self\x00', '{\x00', 'syz'], 0x20, [], [0x80000000, 0x4, 0xffffffffffffe97c, 0xffff]}) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000880)={0x0, r7}, 0x5c) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f0000000140)=0x9) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r8 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r9 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r8, 0x0, r9}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r3, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x190) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:08 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x0) mount(&(0x7f0000000140)=@sg0='/dev/sg0\x00', &(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000780)='omfs\x00', 0x40, 0x0) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000280)=0x1f) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) ioctl$SIOCNRDECOBS(r0, 0x89e2) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f00000007c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @local}], 0x10) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:08 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000a00)=@raw={'raw\x00', 0x9, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x150, 0x270, 0x270, 0x270, 0x270, 0x270, 0x3, &(0x7f0000000140), {[{{@ip={@local, @local, 0xff, 0xffffffff, 'nlmon0\x00', 'sit0\x00', {0xff}, {}, 0xff, 0x0, 0x1}, 0x0, 0xe8, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x5}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x18, 0x100, 0xffff, 0x7, 'snmp_trap\x00', 'syz1\x00', 0xb3}}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x401, [0x8001, 0x2, 0x3, 0xffff, 0x745241a7, 0xffffffff], 0x7, 0x5}, {0xe904, [0x800, 0x2, 0x963, 0x9, 0x2, 0x3], 0x0, 0x2c}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:08 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 537.523807][T12406] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 537.549916][T12406] BTRFS error (device loop5): superblock checksum mismatch 13:18:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x8c, &(0x7f0000000040)=[@in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e21, @rand_addr=0x2}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r2, 0x2, 0x5, [0x897b, 0x6, 0x8, 0x3, 0x1]}, 0x12) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:09 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000000)={@mcast1}, &(0x7f0000000040)=0x14) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000100)={0x1, 0x800}) r2 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) close(r2) seccomp(0x1, 0xa, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x10200000006}]}) close(r2) [ 537.590096][T12406] BTRFS error (device loop5): open_ctree failed [ 537.733742][T12639] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 537.768460][T12639] BTRFS error (device loop4): superblock checksum mismatch [ 537.802233][T12639] BTRFS error (device loop4): open_ctree failed 13:18:09 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x2000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r3, 0x86, 0x40, 0x10000, 0x5, 0x7}, 0x14) write$P9_RWALK(r2, &(0x7f0000000080)={0x64, 0x6f, 0x2, {0x7, [{0xe1}, {0x13, 0x4, 0x4}, {0x40, 0x1, 0x6}, {0x48, 0x2}, {0xa4, 0x4, 0x6}, {0x8, 0x0, 0x8}, {0x12, 0x0, 0x8}]}}, 0x64) 13:18:09 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:09 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000a00)="89bce0a42ccbf030e469e8cba0c6162f37b7ea3dfc57f081dd9ffa752df54472e568a566afc83e325afdd059f5aa124173c56a798dd895aae67e126203df978b126ac59e9e4bf31d7d2ad38b74c0a3efb7ec28e888a56f6490929cbd126c2bd384e53026a4c254bb61752bf3529a1d15d4eb6530c6662ab05fd434ac1220dec9756b3ce9e052b7b96d9cf6d2abccc4595fad560c028ad937dfb519776e38a21e89a0eac65cf8a0db9ffb9b487a271948cf3dc44323e526196b1144f3ee68dbab7bf217397e5e4297398bca1d870b5eece1cd4b40a707f5000e162bd7893a483654c8ea44850b8f87cb28265943d97bf1") r3 = semget$private(0x0, 0x6, 0x1) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) semtimedop(r3, &(0x7f0000000800)=[{0x4000000000000000, 0xffffffffffffffff, 0x1000}, {0x1, 0x3}], 0x2, &(0x7f0000000300)={r4, r5+30000000}) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x1a1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={0x0, r2}, 0xe5a06a1063014385) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r6, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r7 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r8 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r7, 0x0, r8}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="100388ad9817000000"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x134, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:09 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1000000017000007002e2f4e7610d930"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x2000000000000001, 0x84) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000200)={0xba0, 0x0, [], {0x0, @reserved}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)={r3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x6, 0x1000, 0x2, 0x100000001, 0x100, 0x10000, 0x3ff, 0x3, r4}, &(0x7f0000000180)=0x20) inotify_init1(0x80800) close(r0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000002c0)) 13:18:09 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'v\xf3\x94\x00\x00_\x00\x00@\x00\x00\x00\x00(\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000400)=""/19) socket$inet(0x2, 0x4, 0xfffffffffffffef2) r2 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$sock_netdev_private(r2, 0x89fc, &(0x7f0000000100)="69afd0de717330b139876c69ad47846b86fc986971d4c3047a8a681e052772009e7c9bebcfbc93cd5221b58ddcbf570b72bb86bcfc878cff2f2445b18db5ed94c8daf37d7abb9af79e268b183884aff0b2") ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 13:18:09 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:10 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x4000) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) fallocate(r2, 0x0, 0x81, 0x8000) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'vcan0\x00', {0x2, 0x4e22, @loopback}}) 13:18:10 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:10 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0xc9, 0x400000) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80100, 0x40001aa) connect$inet(r2, &(0x7f0000000280)={0x2, 0x4e24, @empty}, 0x10) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="880000001654a2af458b4d0350e924b49eaa8700b40aed3c45873d971048a4d702c128c99581304fe35541ddcefa54b95adc838beb8b348a4bafd90921324f369cbdf6aea02e3f8f6d8d6cb1003867c914d7a92f3ad086838059f148052e4ef519c336f6007bc46de2ba2627e4ad741e8f2b920a35842d0cf5429e8dddfa9b3cc64faad0c89d5e7aa5c4fd91f091727087f294b7dd68b58cc5b4e98e029a0014bba95b988bd66138273928b2eb4002bfceb38a0dbe7b9b97965949abd6f56d0ceb53fe134d3f7b1e889162c2845fa81c406dc8bef5212a099424ba5892e7cb583a2574bbf5a6000000000000000000000000"], &(0x7f0000000100)=0x90) r5 = accept4(r2, &(0x7f00000002c0)=@nl=@proc, &(0x7f0000000340)=0x80, 0x800) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, &(0x7f0000000380)={{0xcd, 0x4, 0xa2b, 0x7, 0x100, 0x9}, 0x80000, 0x8}) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r4, 0x1e, 0x3, 0x20000000005}, 0x10) close(r0) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x5, 0x80) 13:18:10 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) add_key(&(0x7f0000000280)='cifs.idmap\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f00000009c0)="fe05f8f4c2f89038d879f8eb596c2d43fe978d4ecb4f0acc10acfaf0e6e065f4c88da7e25bf8355d8a72078640ad178e8723d0fada0e9f6f1c8e3f92f2152d19abf4b52d2dd5f46e358d2323c07fe3c382732d592ea84a4ccc1cc5227a8bc06c7c10970c7579a5c78da34b29cdbb231bd962b9af38930ed689e5920485a5e250634559704b6413151d10848c2bb98cd25baeb4311366e7472fea49016dea244ee303eb39f598dd93c24b6341dfec93e7d87c50", 0xb3, 0xfffffffffffffffd) request_key(&(0x7f0000000780)='ceph\x00', 0x0, &(0x7f0000000880)='vmnet0\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="100015e81ed48a42b7952a9a6838f100"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:10 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:10 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'v\xf3\x94\x00\x00_\x00\x00@\x00\x00\x00\x00(\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000400)=""/19) socket$inet(0x2, 0x4, 0xfffffffffffffef2) r2 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$sock_netdev_private(r2, 0x89fc, &(0x7f0000000100)="69afd0de717330b139876c69ad47846b86fc986971d4c3047a8a681e052772009e7c9bebcfbc93cd5221b58ddcbf570b72bb86bcfc878cff2f2445b18db5ed94c8daf37d7abb9af79e268b183884aff0b2") ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 13:18:10 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:11 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000140)={0x65cde6fe, 0x86a, 0x100, 0x1, 0xd2, 0x8001}) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB="100004000000000000002f66696c65307af6bed3d08828de403f7bf30fa556c2ba2c7876f7bca111c9a2d36458fc54244173ad0dd6216c41522ae7c70a6c46a702e51f9cdca7cb6c9e4bdec6673e022301c01f37d251986844653408b09fbed63c1f32c9dad2f789c8ec837091341c41ce74e7639179876a92d5a5b9f41c85e2dd5363f5fe493f6c2cc261cd21b31a56b7d9cda8a4eefbbfb38b41fbfcb65711e3bd701ac317e17460fea5ad010000000000000000000000000000"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:11 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x4000000000000400) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:11 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x113, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000009c0)={0x8, 0x120, 0xfa00, {0x1, {0x4, 0x4, "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", 0x65, 0x6, 0xe1, 0x7f, 0x3, 0x8, 0x10001}, r6}}, 0x128) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:11 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:11 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:11 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="696956ace5150760097614dfce87ce6f87832b5cd3c9caeca6889d92432ce9173e7f1ab33251fa6c36d55054f5bb19380bc9a015ba2081ce8d0e2951aca53bb60df25e299138488d64bc3c093831f696f4b8ad5a2b3b3662ed393e69b8ad48ff63aa4b2f3a5f7107f889cccac1d3fbd5f50ea0240fe8d18baf2015", 0x7b, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r1, 0x2) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000040)) 13:18:11 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x240) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7fffffff, 0x800) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f00000000c0)="0f00142e0f01cb0f01cb0f01d10fc75e050f009a0000640f01cfba4100ecf081530fa900660f7e730c", 0x29}], 0x1, 0x55, &(0x7f0000000140)=[@cstype3={0x5, 0x8}], 0x1) close(r0) [ 539.930955][T14012] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 539.975388][T14012] BTRFS error (device loop4): superblock checksum mismatch 13:18:11 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0, r4}, 0x3c5) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$nfc_llcp(r2, &(0x7f0000000780), &(0x7f0000000280)=0x60) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:11 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 540.031288][T14012] BTRFS error (device loop4): open_ctree failed 13:18:11 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0x4000) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000080)="61c54a238ad0e3c7b18272c3420443984c3a658a462644af6f4088837b5c78ed65dd9c03419c3495e1bf88633d48cc8bd66694ad6c693fba35272ef05cbff4c19bd9b351b6f0f55495a9b7b27b7f9cdd41e51b450a07fcd89d17beb5d7d8f7d39c9597881e27ce0c5012e38f8431dea55c6c50") 13:18:11 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x113, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000009c0)={0x8, 0x120, 0xfa00, {0x1, {0x4, 0x4, "4de2cad1e38389b58a5b5427df18e45252f73b8b3fab6ffeecfed7c9b1d6bac2cea4b1b226d4e243c8994261ff197143bedabcf859c0c5d3604f8eb3fc8707ed54fe7ef9bc6c33f12bd0c4c151f80d3c7105a373b29e572b80bb3572db40912a5773c4ef94af7681a90bda2740e060eaadada3c5fa92e633497fe87930e03e1c165439de0db77c88ffbd876055d1e385eb31d2a3c701ca7c794ae6ab6b2a110bc3a7bf2a8d51255a2fdf8703d7d9465b1eb27a7d209ea13691cefb056f43e2717985e1546e5d16c852f2a3e7a70577e88ae4e695b8fcfe24fe7267bb88a86b3587cdee011c6024cbbc4aa97665c056bb23f2e5706bd0f32b4d335159d16942d4", 0x65, 0x6, 0xe1, 0x7f, 0x3, 0x8, 0x10001}, r6}}, 0x128) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:11 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:11 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x20000, 0x0) fcntl$setflags(r0, 0x2, 0x75bb2469194cb46d) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r1, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r1, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:11 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:11 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x3, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="18010000", @ANYRES16=r3, @ANYBLOB="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"], 0x118}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000000) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000001c0)={0x5, @win={{0x6069, 0x1, 0x1, 0x1f}, 0x0, 0xffffffff, &(0x7f00000000c0)={{0x0, 0x5, 0x7f, 0x2}, &(0x7f0000000080)={{0x2, 0x3c4, 0x100, 0xffffffffffffff01}, &(0x7f0000000040)={{0x7f, 0xf707, 0x6, 0x8}}}}, 0xfffffffffffffff9, &(0x7f0000000100)="7d18264c1f8e76418e646dc6d85c34da58705517d39958cbee97ad21373340392c213a8b8bc117992b4f41e8772bd9f1f60d4dcdbb2e4779ee687fd84e23f6d55311fe974b4e1726d7ce25d77b5057c702ca90965f56298572e0029d3034fee1e38218b7bc7c66a53e6a90cbf3dac0a69f9332e6c294ab44e4e3269ba8e5c79a45569eb2d467ee2c4d1e12252b455d1dc5ccb2f504973de2973cc4e6d02e1a417e152cee3ae91fa050", 0x25c}}) 13:18:12 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xfffffffffffffffb, @bcast, @rose={'rose', 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000780)={0x80, 0x4, [0x1e45c167]}) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000280)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:12 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x80000001, 0x200, 0x8001, 0xba, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r1, 0xf5a, 0x61, "e9bf53cb7f6de9620c6e692b0c5afae0864e9c5fe6f697d82560968bc619513dc54e4165c4e2894921c498aaef9cb9022abc3b12a106a91064fc39c286866ef76d5a8ddf81ac3ec8885ca7c387c18d0dbee0c9819361033c9ab29ea767912c8405"}, 0x69) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 540.716650][T14694] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 540.742742][T14694] BTRFS error (device loop4): superblock checksum mismatch [ 540.793061][T14694] BTRFS error (device loop4): open_ctree failed 13:18:12 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:12 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffe84, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000100)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='team_slave_0\x00', 0x10) socket$inet(0x2, 0xa, 0x4) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffffb5, 0xc0, 0x0, 0x0) 13:18:12 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x8010010000000085) fcntl$addseals(r0, 0x409, 0x1) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x480000, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x4e21, 0x3, 'none\x00', 0x4, 0x8, 0x60}, {@multicast1, 0x4e20, 0x7, 0xfffffffffffffffe, 0x1f, 0xc84}}, 0x44) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:12 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000140)=0x7) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 541.275439][T15112] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 13:18:12 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:12 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:12 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 541.478238][T15285] BTRFS error (device loop4): unsupported checksum algorithm 22813 13:18:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040), 0x3d5) close(r0) [ 541.520025][T15285] BTRFS error (device loop4): superblock checksum mismatch [ 541.558964][T15285] BTRFS error (device loop4): open_ctree failed 13:18:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_unlink(0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7, &(0x7f0000000080), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000bc0), 0x3146e6ddae11d35, 0xf0) 13:18:13 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:13 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:13 executing program 2: r0 = socket$inet6(0xa, 0x1000002008000b, 0x5) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x240, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x6, 0x30}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r3, @in={{0x2, 0x4e20, @loopback}}, 0x2, 0xf, 0xfc8, 0x6, 0x2}, &(0x7f0000000240)=0x98) getsockopt$netlink(r2, 0x10e, 0x1, &(0x7f0000000280)=""/9, &(0x7f00000002c0)=0x9) bind(r0, &(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x80) [ 541.911386][T15228] BTRFS error (device loop4): unsupported checksum algorithm 22813 13:18:13 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 541.986212][T15228] BTRFS error (device loop4): superblock checksum mismatch [ 542.041356][T15228] BTRFS error (device loop4): open_ctree failed 13:18:13 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000fc0)=""/115) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) recvfrom$rose(r4, &(0x7f0000000a00)=""/174, 0xae, 0x120, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@dev, @remote}, &(0x7f0000000780)=0x8) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000ac0)={{0x9, 0x3, 0x9, 0x7, '\x00', 0x1000}, 0x0, [0x4d, 0x2, 0x3ff, 0x1, 0xfffffffffffffffe, 0x2, 0x8ad6, 0x0, 0x12, 0x6, 0x4, 0x2, 0x1, 0xffffffffffff8000, 0x7ff, 0x8, 0x7ff, 0x2, 0x1, 0x5, 0x9, 0xad36, 0x2020, 0x2c261821, 0x7ff, 0x0, 0x6, 0x0, 0x7, 0x7f, 0x0, 0x80000001, 0xc900, 0xfffffffffffffff7, 0xee60, 0x4, 0x5, 0x1, 0x2, 0x8, 0x8, 0x1, 0x0, 0x1, 0xc000000000000000, 0xe, 0xffffffffffffffff, 0x7fff, 0x1, 0x10001, 0x19c, 0x7, 0x27, 0xff7, 0x1, 0x3, 0x5, 0x401, 0x2, 0x20, 0x7, 0x7, 0xff, 0x6a, 0xedad, 0x401, 0x0, 0x80, 0x400, 0x50, 0x6, 0x0, 0xe3, 0x80000001, 0x20, 0xffffffff, 0x4, 0xa876, 0xffa, 0x7, 0x6a0, 0x6, 0x400, 0x2, 0x3, 0x7ff, 0x9, 0x400, 0x4, 0x5, 0x524d, 0x6, 0x6, 0x401, 0xfffffffffffffbff, 0xc0000, 0x0, 0x4, 0x100, 0x4, 0x7, 0xff, 0x0, 0x0, 0x7, 0x1, 0x1f51, 0x1000, 0x100000000, 0x6, 0x1434, 0x7f, 0x0, 0x9, 0x7, 0x581d, 0x1, 0x8, 0x1000, 0x40, 0x1, 0x5, 0x2, 0x7f, 0x100, 0xfffffffffffffffe, 0xfffffffffffff28d, 0xb5f], {0x0, 0x1c9c380}}) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000001080)=ANY=[@ANYBLOB="1000000017ecff0648bc23002e4f66696c6530"], 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000007c0)={0x3, 0x0, 0x10001, 0x6050}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000880)={0x2, r7, 0x10003, 0x100000000}) write$FUSE_POLL(r0, &(0x7f0000001040)={0x18, 0xfffffffffffffff5, 0x4, {0x2}}, 0x18) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x800, @loopback, 0xfffffffffffffffc}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x101]}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x30, r2, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6b}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x60000000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000000)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000140)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000540)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000000c0)="18", 0x1, r0}, 0x68) r4 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r4, 0x0) 13:18:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000080)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:13 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:13 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:13 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:14 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x800000000000fff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="100000001702279c08798fe9bca16c65"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:14 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x6, 0x100) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x319180, 0x0) r2 = open(&(0x7f0000000240)='.\x00', 0x402000, 0x1) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000280)={r1, 0x5, 0xa5, r2}) r3 = accept(0xffffffffffffff9c, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f00000000c0)=0x80) getsockopt$nfc_llcp(r3, 0x118, 0x1, &(0x7f0000000100)=""/142, 0x8e) r4 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r4) 13:18:14 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000001640), &(0x7f0000001680)=0x4) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001940)=ANY=[@ANYBLOB="4a0200080000000000f00000000000000000000000000000", @ANYPTR=&(0x7f00000019c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001a80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0000000000000000376c5d6d15def51b654eede100f00000000001200000000000000000", @ANYPTR=&(0x7f0000001b80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r2 = add_key$keyring(&(0x7f00000018c0)='keyring\x00', &(0x7f0000001900)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)={'syz', 0x3}, &(0x7f0000001740)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', r2) wait4(r1, 0x0, 0x80010002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001400)={0x0, 0x2}, &(0x7f0000001540)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000001580)={r4, @in6={{0xa, 0x4e21, 0x5, @remote, 0x48c4cefd}}}, 0x84) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000280)=""/4096, &(0x7f0000000000)=""/132, &(0x7f0000001280)=""/198, 0x5000}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000013c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000001480)={&(0x7f0000001380), 0xc, &(0x7f0000001440)={&(0x7f00000014c0)=ANY=[@ANYBLOB="9d4d45b8ed62761eab2b159b4930aa91c90d2aa21eea767f82c93c1142dfefe039c282e773eb962d755bb25e923f1288363496b1ea5babf80060e3b459d25b90", @ANYRES16=r5, @ANYBLOB="00042abd7000fbdbd2aa0d4127933e56fdef050a16d617df2518001700000008000010007564703a73797a310000"], 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 542.813840][T16258] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 542.840559][T16258] BTRFS error (device loop4): superblock checksum mismatch 13:18:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x9}, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 542.904962][T16258] BTRFS error (device loop4): open_ctree failed 13:18:14 executing program 0: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x61, 0x2, r0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x56, 0x1000, r2, &(0x7f0000000040)='./file0\x00') 13:18:14 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20102100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, &(0x7f0000000b00)={0x45, 0x2, 0xa, 0xa, 0x101, 0x81}) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r6 = add_key$user(&(0x7f0000000880)='user\x00', &(0x7f00000009c0)={'syz', 0x1}, &(0x7f0000000a00)="067d4f40961e614e31e4e7c8c01dd9b7f48457fbae116078482222e46e9a5f9b02e44537d34075f4bd1ae4c2afe145568fc5cbcfe90ce7e3f09b7e1dd51388a2ef41bd4b58b95f167cdc9e1c10256c2def0fcc4f50655f93c0179ae205e8e7355b6f69562ddf5998c4493316d5f0265210d0bf3dcd38e8e7f4addffcc1afe92966cdf06cb47cbfecf1948f78b74fc632bf3848b87f1edde10716d91419f9175560a874f06e280055085157f82204f17da69c7f88bc1af3d06f3b323d9d9d732e2f7ad32e0f249833155365266f3683b1b522a0428e7e639aa0c00eaa8af1b4a4569dcc481992b02e1eeb43d59182d9e7bbca450c", 0xf4, r5) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000540)=[{&(0x7f0000000280)="1fa0b170bebb845657e0a4bd2f3132ad67606d100db51b6fd886cbc27fe49add2db18df198342665fee5e1cfd84ced752c2f3712898d46", 0x37}], 0x1, r6) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r4, 0xc058534b, &(0x7f0000000780)={0xfffffffeffffffff, 0x9, 0x9, 0x7f4, 0x2ee3, 0x6}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:14 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:14 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8ae, 0x80000) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000080)=0x2, 0x4) 13:18:14 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000a00)={0xa, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:14 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000280)) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="10000000178d0003002e2f66cada696c"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x1000008fb2, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x208800) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x6, {0x7}}, 0x18) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) 13:18:15 executing program 2: socket$inet6(0xa, 0x80003, 0x8010000000000084) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'sit0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xfe\x00\x00\x00\x00\x00\xc0\xfe\a\x00', 0x141}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = socket$inet6_sctp(0xa, 0xffffffffffffffff, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 13:18:15 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:15 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs`', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 543.833653][T16725] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 543.866298][T16725] BTRFS error (device loop4): superblock checksum mismatch 13:18:15 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) [ 543.904328][T16725] BTRFS error (device loop4): open_ctree failed 13:18:15 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000780)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000a00)={0x0, 0x0, 0x8, 0x4, 0x1, 0x2000000, 0x7fffffff, 0xf78c, {0x0, @in={{0x2, 0x4e21, @loopback}}, 0x8, 0x50f, 0x2, 0x3ff, 0x81}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000740)={r1, 0x0, 0xffff}, &(0x7f00000007c0)=0x10) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="0674be4eb2d240686626bf96dac5e6a29c50b13b72b4a6170080a498ff8e73ebf5fba91c57af475f05426a41cb4c2a22b128a6fe2081f1d000ec2179cc9301b8d4534d4f91a3d58e565cc98331f0ffe2cb86c254b1befa13114ffe755a53951e7d6da8a0eb7f33731ee241e82b8d950000000000000000000000"], 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00\xf7>\x0ek\x86fA\xe7\xdf\x97\x004%O*K\xc3\x1f\xcd\xa8\xd5\x84\xa0)u\x8d\xfb\xfa|\xde\x8e\xef_P|\x82\xaeq\x83+') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/229, 0xe5}], 0x1, 0x21) 13:18:15 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsd', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:15 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="cd42ff07000000001534dd3900000000"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:15 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6(0xa, 0x3, 0x84) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000180), 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f00000001c0)={0x8001, 0xfffffffffffffffa, 0x7, 0x4, 0x5, 0x3ff, 0x4, 0xda}, &(0x7f0000000240)={0x2, 0xf345, 0x40, 0x2, 0x7b, 0x8000, 0x563, 0x9}, &(0x7f0000000280)={0x80000001, 0xff, 0x0, 0xfeb0, 0xd01, 0xffff, 0x6, 0x1}, &(0x7f00000002c0)={0x0, 0x7530}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x77359400}, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000300)={&(0x7f0000ffb000/0x2000)=nil, 0xc0, 0x5, 0x10, &(0x7f0000ffa000/0x4000)=nil}) [ 544.741498][T16936] device sit0 entered promiscuous mode 13:18:16 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000a0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:16 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) r5 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000009c0)={{0x2, 0x5, 0x200, 0x9, 'syz1\x00', 0x1}, 0x4, 0x610, 0x1, r5, 0x1, 0x101, 'syz1\x00', &(0x7f0000000280)=['self-\x00'], 0x6, [], [0x5, 0x80000001, 0x14e, 0x9]}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000780)=0x4) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) [ 545.343642][T17020] device sit0 left promiscuous mode [ 545.352611][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 545.352629][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 545.358403][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 545.369933][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 545.649582][T17743] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 545.661757][T17743] BTRFS error (device loop5): superblock checksum mismatch [ 545.680551][T17743] BTRFS error (device loop5): open_ctree failed [ 545.739504][T17412] device sit0 entered promiscuous mode 13:18:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) clock_gettime(0x4, &(0x7f0000000140)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x4014}, {r1, 0x8001}, {r0, 0x300c}], 0x3, &(0x7f00000000c0)={r2, r3+30000000}, &(0x7f0000000100)={0x1f}, 0x8) close(r0) 13:18:17 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x7, 0x21, 0x2}, 0x7) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:17 executing program 0: syz_open_dev$binder(&(0x7f0000000600)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, r3) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}]}) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@sha1={0x1, "0a3368c2b9bf50ae6f09ed5471bef5fbf7a6a673"}, 0x15, 0x2) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b001094", 0x6}], 0x1, 0x81806) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000200)={@loopback, @empty, 0x0, 0x1, [@empty]}, 0x14) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x4d7, 0x20581) sendfile(r2, r5, 0x0, 0x2000006) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r7 = getpgrp(0xffffffffffffffff) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000000500)=0x7ff) fcntl$setownex(r4, 0xf, &(0x7f0000000240)={0x0, r7}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0xf819, 0x40}) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) getpeername$unix(r2, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e) 13:18:17 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:17 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:17 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000780)={{0x2}, {0x4a9, 0x6}, 0x4, 0x3, 0x401}) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e22, @loopback}], 0xfffffffffffffefd) close(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80000, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0d0000000702ff000001000080"], 0xd) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x808, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x5f) 13:18:17 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:17 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0xfffffffffffff6fe, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) tkill(r3, 0x25) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:17 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @sack_perm], 0x2) r1 = socket$inet6(0xa, 0x3, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040), 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000280)='k\xae\xb4g\xd4\xeb') setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000040)=0x7, 0x4) close(r1) [ 547.307531][T17973] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 547.325340][T17973] BTRFS error (device loop4): superblock checksum mismatch 13:18:18 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) r5 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000009c0)={{0x2, 0x5, 0x200, 0x9, 'syz1\x00', 0x1}, 0x4, 0x610, 0x1, r5, 0x1, 0x101, 'syz1\x00', &(0x7f0000000280)=['self-\x00'], 0x6, [], [0x5, 0x80000001, 0x14e, 0x9]}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000780)=0x4) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:18 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 547.417171][T17973] BTRFS error (device loop4): open_ctree failed 13:18:18 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000600)) close(r0) 13:18:19 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000f00)=0x0) ptrace$getsig(0x4202, r1, 0x6, &(0x7f0000000f40)) modify_ldt$write(0x1, &(0x7f00000007c0)={0x8, 0x20001000, 0x4000, 0x1, 0xd98, 0x78c, 0x4, 0x9, 0x1, 0xfffffffffffffffa}, 0x10) ioctl(r0, 0x200004, 0x0) timer_create(0x6, &(0x7f0000000140)={0x0, 0x1f, 0x2, @thr={&(0x7f0000000fc0)="075d2122be6cd62d54419370a2f93ace83c601ec4f1fa5f8daea29d9beed3899df3a4fdcfccfcd37724d1b0fa39ae1b161719e73c7ec0796510bf988bb20f701d7c0da71ce98c5b772f41b591a80d2e7f4c65ab0ca54880cdfb464d840c92206210b56559523cc33934096cce5cce14bc95a0fb5ab89273d85a8d0cf276991800ee1d5cf9724e761fd360914fdf02fd73b751f9768f7906b935c8f3ab09a466f08fe5313edaf1a33d739f5f67bd94563d2127f7bfd8db6acc13f88d20f18fe58d22c77adc3151d49f9d6f5", &(0x7f00000010c0)="57c1b5a11f90512b3ea97a7218b551f1d4805e252fc883dd53a5fd1ea951e267618122a9432c9807fd5e7da03804f4bd368ebddf81aa3fa3377bfc3e0793e9c7a2d065b9768d568dae8b694676023cd53811d8b8e7ca3d5a825651a606119c4f721298ab96b07ee148b85c3bdff14315fa97b7c2c79ee7166072ec0987443360941df8afdc912863cc431aecd27039bed9d138a440a4423d9711cc8382d6b6ea431b4e3f6697d4eefa219101f60f91754f"}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000780)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000d00)={0x0, 0x25, "70585d1f9522e5ca61210914cfb06907c6de3c79ea503f6d0eaaafc88d512953c5ce652385"}, &(0x7f0000000d40)=0x2d) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000d80)={r5, 0xeb, "ac9ab2196b33ce41b53bf1346ecc333fd70a3520c9510b63b059cb1be7c39085d9ffcb5b61a1e579ea24c992d6347160b5066056ff734f746a55b77b4baaa47426f6d71cb7b694337e637ade54dfa359ff51b07a4a92734389c0a4ce72deaa79f9481e5a417e59d6545d6eb679c48f825bbdf477fff3677a40bd8e4e210bd876555ff00bd4348f1c8c0b0d666de843adf893cf1374543138eb85c4a42aa22e78a8bfc5764f184412255a529297db4f045a0a4f5b77ba924ea23298433003029fa9b3cdd6bc9838fbf4f6f6b81a89bbc658f8186741fe0058021f1132e0a127eec23e4c925e3cadfcb92015"}, &(0x7f0000000e80)=0xf3) r6 = semget$private(0x0, 0x6, 0x1) get_thread_area(&(0x7f0000000ec0)={0xffffffff00000000, 0xffffffffffffffff, 0xffffffffffffffff, 0xfff, 0x676, 0x7, 0x0, 0x401, 0x6}) semtimedop(r6, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000b40)='asymmetric\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='GPL^!\x00', 0xfffffffffffffffc) r8 = request_key(&(0x7f0000000c00)='encrypted\x00', &(0x7f0000000c40)={'syz', 0x1}, &(0x7f0000000c80)='btrfs\x00', 0x0) r9 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='/dev\xf0\x03\x00\x00fs-control\x00', r8) r10 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) getsockopt$inet_dccp_int(r0, 0x21, 0x3, &(0x7f0000000880), &(0x7f0000000a00)=0x4) ioctl$VIDIOC_S_PARM(r4, 0xc0cc5616, &(0x7f0000000a40)={0x0, @capture={0x1000, 0x1, {0x401, 0x2}, 0x0, 0x7}}) keyctl$dh_compute(0x17, &(0x7f0000000540)={r9, 0x0, r10}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1000800017020007002e2f66696c6530"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000cc0)=0x0) ioprio_set$pid(0x1, r11, 0xffffffffc725ee46) [ 547.720528][T18546] QAT: Invalid ioctl 13:18:19 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fchdir(0xffffffffffffffff) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) umount2(0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000500), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r2 = semget$private(0x0, 0x6, 0x0) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) [ 547.787129][T18678] QAT: Invalid ioctl 13:18:19 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:19 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)="a4c72699e08f508f6cb57c3746e511", &(0x7f0000000080)="1fcb9ba8205d3ffd67f0ce0de674893cdcce871d56b9bec443b70bf0fc56df94e4e14dcb61287fe58e7d55cfdc8bd1836f20ce1d9ec32da61713d436889cf0226771e598d8b75abaf767b09c6f9cdb6197877b00c070e705eb02349346c138b5ab97e52b7b8c333146d21cceacd57d8c3f26231eb28e4b418b0c328b68cc84ec10"}, 0x20) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 547.895834][T18671] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 547.911448][T18671] BTRFS error (device loop4): superblock checksum mismatch [ 547.919571][T18671] BTRFS error (device loop4): open_ctree failed 13:18:19 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1000000017020005bb1c5914e0319ee3"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:19 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:19 executing program 2: r0 = socket$inet6(0xa, 0x80007, 0x801000000000008c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:19 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) r5 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000009c0)={{0x2, 0x5, 0x200, 0x9, 'syz1\x00', 0x1}, 0x4, 0x610, 0x1, r5, 0x1, 0x101, 'syz1\x00', &(0x7f0000000280)=['self-\x00'], 0x6, [], [0x5, 0x80000001, 0x14e, 0x9]}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000780)=0x4) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:19 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) [ 548.377148][T18950] BTRFS error (device loop4): unsupported checksum algorithm 22813 13:18:19 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 548.430539][T18950] BTRFS error (device loop4): superblock checksum mismatch [ 548.511893][T18950] BTRFS error (device loop4): open_ctree failed 13:18:20 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:20 executing program 2: socket$inet6(0xa, 0x80003, 0x8010000000000084) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) [ 548.670346][T18950] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 548.757457][T18950] BTRFS error (device loop4): superblock checksum mismatch [ 548.854208][T18950] BTRFS error (device loop4): open_ctree failed 13:18:20 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8010000000000084) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x100) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) close(r0) 13:18:20 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1804}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:20 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000540)) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)={0x8001, 0x4, 0x5, 0x0, 0x1, [{0xbde7, 0x6, 0x4, 0x0, 0x0, 0x900}]}) 13:18:20 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) r5 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000009c0)={{0x2, 0x5, 0x200, 0x9, 'syz1\x00', 0x1}, 0x4, 0x610, 0x1, r5, 0x1, 0x101, 'syz1\x00', &(0x7f0000000280)=['self-\x00'], 0x6, [], [0x5, 0x80000001, 0x14e, 0x9]}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000780)=0x4) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x662240, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, r1}, 0xc) socket$inet6(0xa, 0x80003, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) close(r0) 13:18:20 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xf4', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:20 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:20 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) write$P9_RUNLINKAT(r0, &(0x7f0000000280)={0x7, 0x4d, 0x2}, 0x7) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003c80)={0x0, 0x0}, &(0x7f0000003cc0)=0xc) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f0000002540)='./file0\x00', 0x80, 0xa, &(0x7f0000003b80)=[{&(0x7f00000025c0)="81", 0x1}, {&(0x7f0000002600)="fb6e4eba9d9e816ff720211ace615dd9d6e526c6b246258fde539b6b727e922a29244482f8edc4925741b670a84452d7e6681ea25ade74aeedb61bdfa74049551e134d39b5c83a787a17ab8d832b492580255005d3251c2e84dda31d645b0d11d7d4c6d0562d49c798b119f08c82bbb59cb460b973f5ad7569f1d0174cdcd650ec8f3090892a2d993744b99090a075c21e772293bf26ddeec7abe1216862f4c7f08e2d6c165469a8c58e8e9c2402778245edffaef4e51dda7ea7e28a0522e5f60b867e619b3af852b9c5488922e2710633b4d7b4f5efe6ae4c500a", 0xdb, 0x82}, {&(0x7f0000002700)="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", 0x1000}, {&(0x7f0000003700)="81d1c28d2c46feb97e2fd157f6e85f9f8e2afd244c13cfb60318104eb8949980800f82e0b8479d3f284d5d29c0cff7f3", 0x30, 0x6}, {&(0x7f0000003740)="2dfcffba59a8d4023c4ebdb24ca8acef70d38275bdc048e49cee226d2cb98a0d2c06355d296150cd4bac3a3898a794c2de6ab4ea9b93f6615f21a206db90ae7ee456512c31189ed31af1912a99f8e971e5d2200f7f9cee46d3a37655ebd74ce3c153227e70319e9f87c75859159e876afe2a28123fb3ff06442be776cdc19a37561f7daf41044bca0fa7f93be10ad60ed2d694418148d5ed680661d766a133072154a6554de22d9b35d8517b89593291b61bc657fc84ed5d3639fde728a6ddc1dcbd0e8c8f6f4c9353bd88c07108cfddd386d6ea47a53e0178cc3c4f21a22aa421252eb71e80c2a5b1b3fc8b5fcf3d57", 0xf0}, {&(0x7f0000003840)="bfcc971381c1f541dd8d11e3e02ed29d457b69743c9967892098c21f7cfcccc4181a58e43187d5d99be736f109dbede5e286ea526b4936f8db7f1d16f685", 0x3e, 0x35}, {&(0x7f0000003880)="265df614ff4c6da371a37099792f61e1c9f0bddb922627d486e3721b7355103a219fc945ed772c5386d78def97cd127612881c85feb3cacf56a1f9631eb7231ffd32a6ff627bb0cbf911a3e91ce8daa378a12b7a7bca2428d4ba301a3be45cc859c5f0d43e10aa936e81596024e23cd97d35cc26f6851805bbfc7dd4d8f784567fc8f3079eebc8ca4cf3485ebeb3bfb09dcd35e01599c90b925f96f6c3a94950512cfd36c2f60dacba8ec2475af8a6e8b49b79239575eab75ce2a475432a01ca", 0xc0, 0x10000}, {&(0x7f0000003940)="c74ace00b5d3f426329085989af57545e17ac691852d4578e0cd993794694e81f499ec1a725dced3931a170749ffc34d8570b0e777b85d06aede982d65ae19d0f333fd083c9a5d5e65854371280c3d9b64f3d01742d908d1f7edbd96ebcefcd6c33130cebffebd2a92724cbaaa37753722c5b05dc3869c833f8e51e227151b9ca14e349bb65eb8e1dc9d5be9fd0ea72c583245eff77888215cf7", 0x9a, 0x7}, {&(0x7f0000003a00)="acc244d5dd46393f9811e3bead98d94225d0b50fb988bd3f88efa466b7b6a542c3d52dee960cc07ef31c1ade9fc8d0911f2fd48b7459e8f4ecb290579d14d5a1079032a5b3205e23039277443fe2992394231ec09adaefd6f02078e358175291baf5f1cd84345b3835cc95c8febfedd00147b5285bb1b502ef9f1127094109989e0386038efd224b67a3837e3aa850f9c0d63b3c148872f5b949cf26c9c269fe396d3c4646f6b489e1fde68339edd99d8b467fc931db3aec7769249ffbaa8216ce670cb0aa63286aba0d3992b79214f01b16615595d85911c8645695981c57be0c181ca6f97f77025ca547675e87", 0xee, 0x6}, {&(0x7f0000003b00)="8415d8f19ca757a0804a9df2ac7451d94278df3889a3cf826aa56e0a1f17550ffee5038485881011336f6631bc9dc785cc10d9c486a26f360d589fa6e28d510d943f677d5597caa998d9747a3b18ae2fecfb136f687cb48072cf06bc43748f6d0de64ff741a222d7ad64f383b8065a9a170fbcfce6a691", 0x77, 0x7ff}], 0x2001, &(0x7f0000003d00)={[{@noextent_cache='noextent_cache'}, {@alloc_mode_def='alloc_mode=default'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@uid_lt={'uid<', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x39, 0x76, 0x7b, 0x76, 0x7d, 0x77, 0x7f], 0x2d, [0x73, 0x37, 0x36, 0x76], 0x2d, [0x65, 0x3d, 0x66, 0x36], 0x2d, [0x77, 0x67, 0x77, 0x39], 0x2d, [0x7b, 0x3a, 0x66, 0x3d, 0x77, 0x0, 0x62, 0x37]}}}]}) ioctl(r0, 0x3, &(0x7f00000000c0)="0adc1f123c123f3188b070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x2) connect$rose(r3, &(0x7f0000002580)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast]}, 0xffffffa5) ioctl$sock_TIOCOUTQ(r2, 0x890c, 0x0) readv(r0, &(0x7f0000002380)=[{&(0x7f0000000100)=""/37, 0x25}, {&(0x7f0000000140)=""/187, 0xbb}, {&(0x7f0000000200)=""/141, 0x8d}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/185, 0xb9}, {&(0x7f0000001380)=""/4096, 0x1000}], 0x6) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000002400)) r4 = dup2(r2, r2) openat$cgroup_procs(r4, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 13:18:21 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x240082, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000300)=""/77) r2 = semget$private(0x0, 0x1, 0x10) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:21 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="7d64f093b37cac6a7d721282f1ec8f40737bf969a0b7a7337ae18860068795c0e911412cd064f381eea7e60d02f52e49ddf3e9145d2005fe9608502697b32381a04a8eeb0dcbed3a5f3fd4b9902dc02ae5a9e74fc6ee868953a1969bb82d7eb05049d2cab57a9da4291ba5bf5c0115b380ee8399b26c709ac1c75fe77433224b9f79b755a7e78bf81a50c15d533a7f25e66ec3efd844c79bc8fe873689bf35e675567b87da28c5b6d856cd5274e3284310e85e8a767fc7450e9881570d490996f305c88f2dc1b8c6e34dc5acdbdf0ad4f7485dba46cb72a094fa52301ac72cb3cbdaee39f7f4a57a56b2", 0xea, 0xfffffffffffffffd) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x10) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$unlink(0x9, r0, r2) syz_init_net_socket$rose(0xb, 0x5, 0x2) 13:18:21 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) ioctl$VIDIOC_G_EDID(r4, 0xc0285628, &(0x7f0000000540)={0x0, 0x5, 0xed, [], &(0x7f0000000280)=0x4}) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:21 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xa0', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:21 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:21 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000540)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000040)="0adc1f123c923f3188b0706a3828b2798ecd01000000df0836444323622af6a4749a81e5747dbf7262e8a7be1b7b704d67c039a18e32403f8f3aec9b37da16080491ded353365f8b70490c14303b493287932c933e3b5db141049bb00db963dbb4ac75e22e") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000002c0)={'syz_tun\x00', &(0x7f0000002fc0)=ANY=[@ANYBLOB="0f"]}) 13:18:22 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000200)) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r5 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='/dev/btr\xe6s-control\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r5, 0x0, r6}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="10008100ef841702eb0c000200fc9c89332f"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 13:18:22 executing program 0: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0xffffffb7, 0x0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x7e) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000280)={[], 0x81, 0x3, 0x4, 0x4, 0x1}) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) 13:18:22 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:22 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000280)={0x0, @aes256, 0x1, "64a7e2c8893272f4"}) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="100048f70afb72e3d8842f66696c6530e320304e1c730009d5c333c9bffe5f8e6848d1785635c2a7b828b0c9c94a27356b7a1790845bbf6c6c89dcef4f42313df98a8ad1df11e5a392f97a402ed8d7c9ad7ea4c51d650cf5afa7863f4c7ac11f4b1bf9934b38880eb90000008000000000000000"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0xfb, 0x10000}], 0x0, 0x0) 13:18:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000240)={0x2, @sdr}) 13:18:22 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:22 executing program 2: r0 = socket$inet(0x2, 0x4020000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffff9, 0x20000800, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) read(r1, &(0x7f0000000480)=""/13, 0xd) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x8) sendmmsg(r0, &(0x7f0000003c00)=[{{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000c00)="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", 0x87e}], 0x1}}], 0x1, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) 13:18:22 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:22 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, 0xffffffffffffffff) r2 = semget$private(0x0, 0x6, 0x1) semtimedop(r2, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) bind$alg(r0, &(0x7f0000000300)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="10696c65000000ffff00000000000000"], 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:22 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) [ 551.557356][T20673] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 551.593947][T20673] BTRFS error (device loop3): superblock checksum mismatch 13:18:23 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = getpgid(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f0000000280), &(0x7f0000000540)=0x4) r3 = dup2(r2, 0xffffffffffffffff) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="1000000017000007102e2f66696c6530"], 0x10) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockname(r1, &(0x7f0000000140)=@pppol2tpv3, &(0x7f00000001c0)=0x80) [ 551.630247][T20673] BTRFS error (device loop3): open_ctree failed 13:18:23 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={r4, 0x0, 0x18}, 0xc) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) fsetxattr$security_evm(r1, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000300)=@ng={0x4, 0x3}, 0x2, 0x1) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:23 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read(r0, 0x0, 0xe1) 13:18:23 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) 13:18:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f00000000c0)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000240)=""/230, 0xe6}], 0x1, &(0x7f0000000e00)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000140)=""/63, 0x3f}, &(0x7f0000000180), 0x20}}, @cswp={0x58, 0x114, 0x7, {{0x9}, 0x0, 0x0, 0xda3, 0x1ff, 0x1, 0xfffffffffffffffc, 0x0, 0x3ff}}, @rdma_dest={0x18, 0x114, 0x2, {0x7ff, 0xb713}}, @rdma_dest={0x18, 0x114, 0x2, {0x0, 0xef0}}], 0xb8}, 0x200000c0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x6800000000000000, 0x60, &(0x7f00000001c0)={0x0, 'bridge_slave_0\x00'}, 0x18) 13:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000080)='\x00', &(0x7f0000000200)={0xc, 0x0, "59d64b34"}, 0x0, 0x1400) [ 552.353165][T21055] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 552.361127][T21055] BTRFS error (device loop3): superblock checksum mismatch 13:18:23 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x537e, 0x1ff}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000a00)={r4, @in6={{0xa, 0x4e22, 0xfffffffffffffffb, @mcast2, 0x2}}, 0x2, 0x3, 0x9, 0x1, 0x40}, 0x98) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) r6 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r7 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r6, 0x0, r7}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 13:18:24 executing program 2: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x3fc}, 0x10) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000002840)=""/109, 0x6d}], 0x1}, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="de"], 0x1) 13:18:24 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x0) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(&(0x7f0000000200)='rxrpc_s\x00', 0x0, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000017000007002e4700696c65301b65c67275b87909da2240195db041bd5781cb5c7e98447ee53710117de83742e093a2d547983ae3d4b26d992839ec6900000000000000ffed4275091eaf7c32c653a8a8e62a9c2de2fc2e47d5efdcf20aa649a163254b9be3d058d754335bfa34c4f01bb707905655e31e4b5c97fdf9e9"], 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259", 0xfb, 0x10000}], 0x0, 0x0) 13:18:24 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa0008000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 552.540433][T21055] BTRFS error (device loop3): open_ctree failed [ 552.669761][T21225] ================================================================== [ 552.678348][T21225] BUG: KASAN: use-after-free in tipc_sk_filter_rcv+0x2166/0x34f0 [ 552.686080][T21225] Read of size 4 at addr ffff8880a42a0574 by task syz-executor.2/21225 [ 552.694315][T21225] [ 552.696665][T21225] CPU: 1 PID: 21225 Comm: syz-executor.2 Not tainted 5.1.0-rc1-next-20190321 #8 [ 552.705708][T21225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.715770][T21225] Call Trace: [ 552.719079][T21225] dump_stack+0x172/0x1f0 [ 552.723427][T21225] ? tipc_sk_filter_rcv+0x2166/0x34f0 [ 552.728815][T21225] print_address_description.cold+0x7c/0x20d [ 552.734811][T21225] ? tipc_sk_filter_rcv+0x2166/0x34f0 [ 552.740211][T21225] ? tipc_sk_filter_rcv+0x2166/0x34f0 [ 552.745610][T21225] kasan_report.cold+0x1b/0x40 [ 552.750385][T21225] ? tipc_sk_filter_rcv+0x2166/0x34f0 [ 552.755776][T21225] __asan_report_load4_noabort+0x14/0x20 [ 552.761425][T21225] tipc_sk_filter_rcv+0x2166/0x34f0 [ 552.766727][T21225] ? debug_check_no_obj_freed+0x211/0x444 [ 552.772472][T21225] ? kasan_check_write+0x14/0x20 [ 552.777455][T21225] ? tipc_sk_overlimit2+0xa0/0xa0 [ 552.782512][T21225] ? __lock_acquire+0x548/0x3fb0 [ 552.787468][T21225] ? __release_sock+0xca/0x3a0 [ 552.792257][T21225] tipc_sk_backlog_rcv+0xeb/0x1e0 [ 552.797310][T21225] ? tipc_sk_mcast_rcv+0x1020/0x1020 [ 552.802629][T21225] ? __local_bh_enable_ip+0x15a/0x270 [ 552.808015][T21225] ? lockdep_hardirqs_on+0x418/0x5d0 [ 552.813313][T21225] ? __release_sock+0xca/0x3a0 [ 552.818096][T21225] ? trace_hardirqs_on+0x67/0x230 [ 552.823131][T21225] ? __release_sock+0xca/0x3a0 [ 552.827922][T21225] ? __local_bh_enable_ip+0x15a/0x270 [ 552.833320][T21225] __release_sock+0x12e/0x3a0 [ 552.838024][T21225] release_sock+0x59/0x1c0 [ 552.842471][T21225] tipc_setsockopt+0x496/0xb60 [ 552.847269][T21225] ? tipc_sk_finish_conn+0x640/0x640 [ 552.852581][T21225] ? apparmor_socket_setsockopt+0x22/0x30 [ 552.858337][T21225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.864672][T21225] ? security_socket_setsockopt+0x93/0xc0 [ 552.870458][T21225] __sys_setsockopt+0x180/0x280 [ 552.875355][T21225] ? kernel_accept+0x310/0x310 [ 552.880138][T21225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 552.885605][T21225] ? do_syscall_64+0x26/0x610 [ 552.890302][T21225] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.896379][T21225] ? do_syscall_64+0x26/0x610 [ 552.901070][T21225] __x64_sys_setsockopt+0xbe/0x150 [ 552.906201][T21225] do_syscall_64+0x103/0x610 [ 552.910816][T21225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.916737][T21225] RIP: 0033:0x458209 [ 552.920640][T21225] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 552.940251][T21225] RSP: 002b:00007fbeecd64c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 552.948682][T21225] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458209 [ 552.956713][T21225] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000004 [ 552.964706][T21225] RBP: 000000000073bf00 R08: 0000000000000010 R09: 0000000000000000 [ 552.972684][T21225] R10: 00000000200000c0 R11: 0000000000000246 R12: 00007fbeecd656d4 [ 552.980679][T21225] R13: 00000000004c6315 R14: 00000000004db380 R15: 00000000ffffffff [ 552.988685][T21225] [ 552.991027][T21225] Allocated by task 20187: [ 552.995450][T21225] save_stack+0x45/0xd0 [ 552.999618][T21225] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 553.005260][T21225] kasan_kmalloc+0x9/0x10 [ 553.009595][T21225] __kmalloc_node_track_caller+0x4e/0x70 [ 553.015247][T21225] __kmalloc_reserve.isra.0+0x40/0xf0 13:18:24 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000540)={r4, 0x0, r5}, &(0x7f0000000580)=""/9, 0x9, &(0x7f0000000700)={&(0x7f00000005c0)={'vmac(khazad)\x00'}, &(0x7f0000000600)="4c5386ee9abfa007b26d2ca50ed7b6b4632ad366404306caebdd0d2e4aa789790e298aec9f0dc8aa631198fcc7b4ff3768ff69a0b79ce49cc2de8679ad2562ea199b65a1b90cea4fb8172dfb9045477fa052233794627fae3b7a833ff6bf2274cab6dcd5a517aea27f9f674372ffb5e3a066bcae8fa0433fcfc20175ca855fded14691bb6729f8deb71582b478dd05ebc5fd6971124fd7ec9d364feb5abf6e3257e02b22395668848f81ca866b071224e144db793c44f1ac3c438ad6d7c35222d49c63ece209ec5f022a0c0cd896abb1e28e1fd419b41315557f80ebc06e2d4bf81f37035704d5d2e56cdf5166b69cab1a86", 0xf2}) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa0010000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 553.020632][T21225] __alloc_skb+0x10b/0x5e0 [ 553.025117][T21225] tipc_buf_acquire+0x2f/0x100 [ 553.029891][T21225] tipc_msg_create+0x38/0x270 [ 553.029960][T21225] tipc_topsrv_kern_evt+0x2a7/0x580 [ 553.029984][T21225] tipc_conn_send_to_sock+0x43e/0x5f0 [ 553.045236][T21225] tipc_conn_send_work+0x65/0x80 [ 553.050232][T21225] process_one_work+0x98e/0x1790 [ 553.055183][T21225] worker_thread+0x98/0xe40 [ 553.059728][T21225] kthread+0x357/0x430 [ 553.063819][T21225] ret_from_fork+0x3a/0x50 [ 553.068234][T21225] [ 553.070564][T21225] Freed by task 21225: [ 553.074646][T21225] save_stack+0x45/0xd0 [ 553.078810][T21225] __kasan_slab_free+0x102/0x150 [ 553.083752][T21225] kasan_slab_free+0xe/0x10 [ 553.088262][T21225] kfree+0xcf/0x230 [ 553.092078][T21225] skb_free_head+0x93/0xb0 [ 553.096502][T21225] skb_release_data+0x576/0x7a0 [ 553.101359][T21225] skb_release_all+0x4d/0x60 [ 553.105950][T21225] kfree_skb+0xe8/0x390 [ 553.110119][T21225] tipc_sk_filter_rcv+0x1e6a/0x34f0 [ 553.115324][T21225] tipc_sk_backlog_rcv+0xeb/0x1e0 [ 553.120355][T21225] __release_sock+0x12e/0x3a0 [ 553.125033][T21225] release_sock+0x59/0x1c0 [ 553.129454][T21225] tipc_setsockopt+0x496/0xb60 [ 553.134239][T21225] __sys_setsockopt+0x180/0x280 [ 553.139108][T21225] __x64_sys_setsockopt+0xbe/0x150 [ 553.144230][T21225] do_syscall_64+0x103/0x610 [ 553.148841][T21225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.154725][T21225] [ 553.154738][T21225] The buggy address belongs to the object at ffff8880a42a04c0 [ 553.154738][T21225] which belongs to the cache kmalloc-1k of size 1024 [ 553.154751][T21225] The buggy address is located 180 bytes inside of [ 553.154751][T21225] 1024-byte region [ffff8880a42a04c0, ffff8880a42a08c0) [ 553.154756][T21225] The buggy address belongs to the page: [ 553.154771][T21225] page:ffffea000290a800 count:1 mapcount:0 mapping:ffff88812c3f0ac0 index:0x0 compound_mapcount: 0 [ 553.154789][T21225] flags: 0x1fffc0000010200(slab|head) [ 553.154814][T21225] raw: 01fffc0000010200 ffffea0002221e88 ffffea00026b0888 ffff88812c3f0ac0 [ 553.214747][T21225] raw: 0000000000000000 ffff8880a42a0040 0000000100000007 0000000000000000 [ 553.223334][T21225] page dumped because: kasan: bad access detected [ 553.229742][T21225] [ 553.232070][T21225] Memory state around the buggy address: [ 553.237715][T21225] ffff8880a42a0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 553.245786][T21225] ffff8880a42a0480: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 553.253850][T21225] >ffff8880a42a0500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 553.261914][T21225] ^ 13:18:24 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x240001, 0x0) ioctl(r0, 0x200004, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0xffffffffffffe008) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000440)="6bd73707388e454ac4871016c4e79cdddf04b28d8e73ed3a4fc2ddfb36d699b2910deda55e6004dfa1e160a48cf9ad8d2e1a0c085a3b33619e0845f23103ef97bb72d4f1c4ff427a0193361d737fa46252e4224dd2ef901ac583d127201dd8068a6f1c96f70ef8e6d659f64b754b57312c6a1d1409a3c886acc43e68d033869fc8807dd9b12b1685c8ffa1e3d6bf2e4cac6c2b58ead33b30334f41d834210e24ec6590fa5fb79b7665c58833dac94b4d0a76530c4455b9c75914f8e04576706073f779869eef21c4898fbed6de7a207abfb7324a6d0c219be63ec2bb02d68b3a62f18da011aef8dc", 0xe8, 0xfffffffffffffff9) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000580)=""/9, 0x9, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000740)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab", 0xe3, 0x10000}], 0x0, 0x0) [ 553.269645][T21225] ffff8880a42a0580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 553.277752][T21225] ffff8880a42a0600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 553.285811][T21225] ================================================================== [ 553.293873][T21225] Disabling lock debugging due to kernel taint [ 553.330899][T21225] Kernel panic - not syncing: panic_on_warn set ... [ 553.337536][T21225] CPU: 0 PID: 21225 Comm: syz-executor.2 Tainted: G B 5.1.0-rc1-next-20190321 #8 [ 553.347946][T21225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.357999][T21225] Call Trace: [ 553.361294][T21225] dump_stack+0x172/0x1f0 [ 553.365694][T21225] panic+0x2cb/0x65c [ 553.369598][T21225] ? __warn_printk+0xf3/0xf3 [ 553.374187][T21225] ? tipc_sk_filter_rcv+0x2166/0x34f0 [ 553.383121][T21225] ? preempt_schedule+0x4b/0x60 [ 553.387970][T21225] ? ___preempt_schedule+0x16/0x18 [ 553.393077][T21225] ? trace_hardirqs_on+0x5e/0x230 [ 553.398106][T21225] ? tipc_sk_filter_rcv+0x2166/0x34f0 [ 553.403915][T21225] end_report+0x47/0x4f [ 553.408065][T21225] ? tipc_sk_filter_rcv+0x2166/0x34f0 [ 553.413430][T21225] kasan_report.cold+0xe/0x40 [ 553.418107][T21225] ? tipc_sk_filter_rcv+0x2166/0x34f0 [ 553.423480][T21225] __asan_report_load4_noabort+0x14/0x20 [ 553.429114][T21225] tipc_sk_filter_rcv+0x2166/0x34f0 [ 553.434308][T21225] ? debug_check_no_obj_freed+0x211/0x444 [ 553.440026][T21225] ? kasan_check_write+0x14/0x20 [ 553.444963][T21225] ? tipc_sk_overlimit2+0xa0/0xa0 [ 553.449993][T21225] ? __lock_acquire+0x548/0x3fb0 [ 553.454926][T21225] ? __release_sock+0xca/0x3a0 [ 553.459690][T21225] tipc_sk_backlog_rcv+0xeb/0x1e0 [ 553.464713][T21225] ? tipc_sk_mcast_rcv+0x1020/0x1020 [ 553.470000][T21225] ? __local_bh_enable_ip+0x15a/0x270 [ 553.475369][T21225] ? lockdep_hardirqs_on+0x418/0x5d0 [ 553.480647][T21225] ? __release_sock+0xca/0x3a0 [ 553.485420][T21225] ? trace_hardirqs_on+0x67/0x230 [ 553.490442][T21225] ? __release_sock+0xca/0x3a0 [ 553.495205][T21225] ? __local_bh_enable_ip+0x15a/0x270 [ 553.500572][T21225] __release_sock+0x12e/0x3a0 [ 553.505251][T21225] release_sock+0x59/0x1c0 [ 553.510075][T21225] tipc_setsockopt+0x496/0xb60 [ 553.514836][T21225] ? tipc_sk_finish_conn+0x640/0x640 [ 553.520122][T21225] ? apparmor_socket_setsockopt+0x22/0x30 [ 553.525840][T21225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.532073][T21225] ? security_socket_setsockopt+0x93/0xc0 [ 553.537791][T21225] __sys_setsockopt+0x180/0x280 [ 553.542638][T21225] ? kernel_accept+0x310/0x310 [ 553.547399][T21225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 553.552856][T21225] ? do_syscall_64+0x26/0x610 [ 553.557527][T21225] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.563584][T21225] ? do_syscall_64+0x26/0x610 [ 553.568257][T21225] __x64_sys_setsockopt+0xbe/0x150 [ 553.573368][T21225] do_syscall_64+0x103/0x610 [ 553.577956][T21225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.583839][T21225] RIP: 0033:0x458209 [ 553.587735][T21225] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 553.607331][T21225] RSP: 002b:00007fbeecd64c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 553.615756][T21225] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458209 [ 553.623725][T21225] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000004 [ 553.631713][T21225] RBP: 000000000073bf00 R08: 0000000000000010 R09: 0000000000000000 [ 553.639704][T21225] R10: 00000000200000c0 R11: 0000000000000246 R12: 00007fbeecd656d4 [ 553.647669][T21225] R13: 00000000004c6315 R14: 00000000004db380 R15: 00000000ffffffff [ 553.656345][T21225] Kernel Offset: disabled [ 553.660661][T21225] Rebooting in 86400 seconds..