DUID 00:04:6d:ca:d3:d4:76:e5:48:e7:d9:66:92:48:7e:5c:97:0d
forked to background, child pid 3205
[   12.878035][ T3206] 8021q: adding VLAN 0 to HW filter on device bond0
[   12.881561][ T3206] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK

syzkaller
syzkaller login: [   69.907948][  T148] cfg80211: failed to load regulatory.db
Warning: Permanently added '10.128.0.88' (ECDSA) to the list of known hosts.
executing program
[  309.691337][ T3651] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[  309.786465][ T3652] loop0: detected capacity change from 0 to 32768
[  309.793567][ T3652] BTRFS: device fsid e417788f-7a09-42b2-9266-8ddc5d5d35d2 devid 1 transid 8 /dev/loop0 scanned by syz-executor193 (3652)
[  309.807383][ T3652] BTRFS info (device loop0): using xxhash64 (xxhash64-generic) checksum algorithm
[  309.816601][ T3652] BTRFS info (device loop0): doing ref verification
[  309.823199][ T3652] BTRFS info (device loop0): setting nodatasum
[  309.829365][ T3652] BTRFS info (device loop0): max_inline at 0
[  309.835324][ T3652] BTRFS info (device loop0): enabling ssd optimizations
[  309.842254][ T3652] BTRFS info (device loop0): using free space tree
executing program
[  315.201731][ T3674] loop0: detected capacity change from 0 to 32768
[  315.209751][ T3674] BTRFS info (device loop0): using xxhash64 (xxhash64-generic) checksum algorithm
[  315.219018][ T3674] BTRFS info (device loop0): doing ref verification
[  315.225619][ T3674] BTRFS info (device loop0): setting nodatasum
[  315.231812][ T3674] BTRFS info (device loop0): max_inline at 0
[  315.237811][ T3674] BTRFS info (device loop0): enabling ssd optimizations
[  315.244768][ T3674] BTRFS info (device loop0): using free space tree
executing program
[  320.604935][ T3695] loop0: detected capacity change from 0 to 32768
[  320.612768][ T3695] BTRFS info (device loop0): using xxhash64 (xxhash64-generic) checksum algorithm
[  320.622210][ T3695] BTRFS info (device loop0): doing ref verification
[  320.628842][ T3695] BTRFS info (device loop0): setting nodatasum
[  320.635012][ T3695] BTRFS info (device loop0): max_inline at 0
[  320.641062][ T3695] BTRFS info (device loop0): enabling ssd optimizations
[  320.648050][ T3695] BTRFS info (device loop0): using free space tree
executing program
executing program
executing program
[  326.008088][ T3716] loop0: detected capacity change from 0 to 32768
[  326.015929][ T3716] BTRFS info (device loop0): using xxhash64 (xxhash64-generic) checksum algorithm
[  326.025177][ T3716] BTRFS info (device loop0): doing ref verification
[  326.031772][ T3716] BTRFS info (device loop0): setting nodatasum
[  326.037939][ T3716] BTRFS info (device loop0): max_inline at 0
[  326.043898][ T3716] BTRFS info (device loop0): enabling ssd optimizations
[  326.050832][ T3716] BTRFS info (device loop0): using free space tree
[  331.426976][ T3742] loop0: detected capacity change from 0 to 32768
[  331.435107][ T3742] BTRFS info (device loop0): using xxhash64 (xxhash64-generic) checksum algorithm
[  331.444345][ T3742] BTRFS info (device loop0): doing ref verification
[  331.450936][ T3742] BTRFS info (device loop0): setting nodatasum
[  331.457104][ T3742] BTRFS info (device loop0): max_inline at 0
[  331.463101][ T3742] BTRFS info (device loop0): enabling ssd optimizations
[  331.470037][ T3742] BTRFS info (device loop0): using free space tree
[  336.837536][ T3765] loop0: detected capacity change from 0 to 32768
[  336.845327][ T3765] BTRFS info (device loop0): using xxhash64 (xxhash64-generic) checksum algorithm
[  336.854573][ T3765] BTRFS info (device loop0): doing ref verification
[  336.861171][ T3765] BTRFS info (device loop0): setting nodatasum
[  336.867351][ T3765] BTRFS info (device loop0): max_inline at 0
[  336.873315][ T3765] BTRFS info (device loop0): enabling ssd optimizations
[  336.880244][ T3765] BTRFS info (device loop0): using free space tree
executing program
[  342.253552][ T3787] loop0: detected capacity change from 0 to 32768
[  342.261466][ T3787] BTRFS info (device loop0): using xxhash64 (xxhash64-generic) checksum algorithm
[  342.270712][ T3787] BTRFS info (device loop0): doing ref verification
[  342.277307][ T3787] BTRFS info (device loop0): setting nodatasum
[  342.283647][ T3787] BTRFS info (device loop0): max_inline at 0
[  342.289628][ T3787] BTRFS info (device loop0): enabling ssd optimizations
[  342.296644][ T3787] BTRFS info (device loop0): using free space tree
executing program
[  347.660382][ T3807] loop0: detected capacity change from 0 to 32768
[  347.668349][ T3807] BTRFS info (device loop0): using xxhash64 (xxhash64-generic) checksum algorithm
[  347.677697][ T3807] BTRFS info (device loop0): doing ref verification
[  347.684330][ T3807] BTRFS info (device loop0): setting nodatasum
[  347.690528][ T3807] BTRFS info (device loop0): max_inline at 0
[  347.696549][ T3807] BTRFS info (device loop0): enabling ssd optimizations
[  347.703526][ T3807] BTRFS info (device loop0): using free space tree
[  352.919966][ T3651] kmemleak: 33 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88810f8ea480 (size 64):
  comm "syz-executor193", pid 3787, jiffies 4294971495 (age 12.820s)
  hex dump (first 32 bytes):
    03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ed790>] kmalloc_trace+0x20/0x90
    [<ffffffff820869aa>] add_tree_block+0x3a/0x210
    [<ffffffff82087e7c>] btrfs_build_ref_tree+0x50c/0x750
    [<ffffffff846b818d>] open_ctree+0x19af/0x1fcb
    [<ffffffff846b17d6>] btrfs_mount_root.cold+0x13/0xf5
    [<ffffffff81662b0b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc948>] vfs_get_tree+0x28/0x100
    [<ffffffff81638b61>] vfs_kern_mount.part.0+0xd1/0x120
    [<ffffffff81638bec>] vfs_kern_mount+0x3c/0x60
    [<ffffffff81f54029>] btrfs_mount+0x199/0x590
    [<ffffffff81662b0b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc948>] vfs_get_tree+0x28/0x100
    [<ffffffff81640487>] path_mount+0xc37/0x10d0
    [<ffffffff8164106e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff8485b285>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff88810c91f040 (size 64):
  comm "syz-executor193", pid 3787, jiffies 4294971495 (age 12.820s)
  hex dump (first 32 bytes):
    03 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00  ................
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ed790>] kmalloc_trace+0x20/0x90
    [<ffffffff82086355>] add_block_entry+0x35/0x320
    [<ffffffff82086a0e>] add_tree_block+0x9e/0x210
    [<ffffffff82087e7c>] btrfs_build_ref_tree+0x50c/0x750
    [<ffffffff846b818d>] open_ctree+0x19af/0x1fcb
    [<ffffffff846b17d6>] btrfs_mount_root.cold+0x13/0xf5
    [<ffffffff81662b0b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc948>] vfs_get_tree+0x28/0x100
    [<ffffffff81638b61>] vfs_kern_mount.part.0+0xd1/0x120
    [<ffffffff81638bec>] vfs_kern_mount+0x3c/0x60
    [<ffffffff81f54029>] btrfs_mount+0x199/0x590
    [<ffffffff81662b0b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc948>] vfs_get_tree+0x28/0x100
    [<ffffffff81640487>] path_mount+0xc37/0x10d0
    [<ffffffff8164106e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff8485b285>] do_syscall_64+0x35/0xb0

BUG: memory leak
unreferenced object 0xffff88810caab580 (size 96):
  comm "syz-executor193", pid 3787, jiffies 4294971495 (age 12.820s)
  hex dump (first 32 bytes):
    00 10 10 00 00 00 00 00 00 10 00 00 00 00 00 00  ................
    01 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00  ................
  backtrace:
    [<ffffffff814ed790>] kmalloc_trace+0x20/0x90
    [<ffffffff8208636e>] add_block_entry+0x4e/0x320
    [<ffffffff82086a0e>] add_tree_block+0x9e/0x210
    [<ffffffff82087e7c>] btrfs_build_ref_tree+0x50c/0x750
    [<ffffffff846b818d>] open_ctree+0x19af/0x1fcb
    [<ffffffff846b17d6>] btrfs_mount_root.cold+0x13/0xf5
    [<ffffffff81662b0b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc948>] vfs_get_tree+0x28/0x100
    [<ffffffff81638b61>] vfs_kern_mount.part.0+0xd1/0x120
    [<ffffffff81638bec>] vfs_kern_mount+0x3c/0x60
    [<ffffffff81f54029>] btrfs_mount+0x199/0x590
    [<ffffffff81662b0b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc948>] vfs_get_tree+0x28/0x100
    [<ffffffff81640487>] path_mount+0xc37/0x10d0
    [<ffffffff8164106e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff8485b285>] do_syscall_64+0x35/0xb0