penat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(0xffffffffffffffff, 0x0, 0xff02160) dup3(r0, r4, 0x80000) 12:29:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r4}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x3, 0x1, 0x1, {0x7, @sliced={0xfff, [0x9, 0x4, 0x3, 0x2, 0x800, 0x401, 0x0, 0xa09e, 0x3, 0x8, 0xd23, 0x4, 0x3ff, 0x1f, 0x3, 0x100, 0x1, 0x3cc, 0x200, 0x2, 0xfff8, 0x1000, 0x520, 0xff, 0x9, 0x3f, 0x7, 0x7a, 0x7ff, 0x6, 0x6, 0xfff7, 0x7b, 0x8, 0x5, 0x4, 0xb098, 0x6, 0x2, 0x20, 0x0, 0x3, 0x3, 0x2, 0x3ff, 0x1, 0x3a4, 0x1ff], 0x2c}}, 0x5}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x3, 0x24}}}}, [@chandef_params, @NL80211_ATTR_DURATION={0x8, 0x57, 0x3ff}]}, 0x30}}, 0x0) [ 581.513101] audit: type=1400 audit(1602592154.301:36): avc: denied { relabelfrom } for pid=4110 comm="syz-executor.2" name="" dev="pipefs" ino=114503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 [ 581.535843] SELinux: Context /usr/sbin/ntpd is not valid (left unmapped). 12:29:14 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(0xffffffffffffffff, 0x0, 0xff02160) dup3(r0, r4, 0x80000) 12:29:14 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000009030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:14 executing program 1: mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x1804, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0x100000000}}, {@mode={'mode', 0x3d, 0x101}}, {@mode={'mode', 0x3d, 0x800}}, {@mode={'mode', 0x3d, 0xfffffffffffff000}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x101}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x8}}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@pcr={'pcr', 0x3d, 0x13}}, {@smackfstransmute={'smackfstransmute', 0x3d, '@'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x33, 0x37, 0x64, 0x39, 0x66, 0x73, 0x35], 0x2d, [0x60, 0x65, 0x30, 0x37], 0x2d, [0x35, 0x32, 0x65, 0x31], 0x2d, [0x32, 0x33, 0x6a, 0x61], 0x2d, [0x35, 0x39, 0x36, 0x66, 0x61, 0x63, 0x65, 0x64]}}}, {@fsname={'fsname'}}, {@obj_role={'obj_role', 0x3d, 'nl80211\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'nl80211\x00'}}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000340)) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x3ff}]}, 0x2c}}, 0x0) [ 581.754372] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop5 12:29:14 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(0xffffffffffffffff, 0x0, 0xff02160) dup3(r0, r4, 0x80000) 12:29:14 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000a030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 581.873791] BTRFS error (device loop5): superblock checksum mismatch [ 581.907214] BTRFS error (device loop5): open_ctree failed 12:29:15 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) dup3(0xffffffffffffffff, r3, 0x80000) 12:29:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:15 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000c030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="070000001f00400001000200bf01040000c0"], &(0x7f00000000c0)=0x12) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000037000000250003003ffa740506aa463ff5d0b105b4ad5b940b4fce081aa6cc671b9a7d0fc3d3b3e30be8369fb0a313ef88e865a98ca1dec8ba904c114fc9c3b34f4abb197e958ccf9e6fef1d6b00f916cbeff301dc2da84d8281f10de7c099e661bc5fb1a5e8cabd1306320bff2364f757", @ANYRES32=r4, @ANYBLOB="080026006c09000008005700ff030000"], 0x2c}}, 0x0) 12:29:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:15 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) dup2(r2, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r5, 0xc0505405, &(0x7f0000000000)={{0x2, 0x1, 0x21b, 0x2, 0x9}, 0x3, 0x3f, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x23, 0x2, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r7, 0xf502, 0x0) write$UHID_CREATE(r0, &(0x7f0000000400)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000140)=""/145, 0x91, 0x20, 0x2, 0x957, 0x2, 0x100}}, 0x120) close(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r8, &(0x7f00000003c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @rand_addr=0x64010180}, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYRES32=r1, @ANYRES32=r8, @ANYRES64, @ANYBLOB="a8746c19be4c616fcc58071572bc744296ecc00fa4a9e199ab6cc4cbff596d0500000000000017aef77f209d930d77e0d518ad9ee38461afe1582a0eb2ea27f4e0b61002d5e1eebda09b7ceba6ac73179f90912edade20feb8202642f1124768aa8e9e4300dea69c63ce465cbb68e9669b52835ae2974f46114c1b29abb2524d3340ccfe80f4c5fb40b852000000000000000000"], 0x4240a2a0) splice(r0, 0x0, r6, 0x0, 0x100000, 0x0) 12:29:15 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) dup3(0xffffffffffffffff, r3, 0x80000) 12:29:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:15 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) dup3(0xffffffffffffffff, r3, 0x80000) [ 582.300618] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:29:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000009c0)={0x1, &(0x7f0000002080)="2768330e5717606279aa77069a047a45d24d55b0f65f520fe3e4a50f899de0684b27c25892157908198fac40fce6ed693c1c55565492dd290ee2975f36e20c44faf8416fa2e1aee7f32730fd4cc0af634182d27803cd7b6a5b7778e773c9170d60f0e5e25b028656fb76d3eb02fb48adf0a119aeaf62c205e7e3caef9152ecddeb9d8e5d6f3ca7e5543919a2086058f804145d80b2cd8de11799328c6646eb83f6b9a289fc20bb95bb4800d81f60096c69ca42b25a1e12b291cf7b6348022732843f434a81f10dbfa338bfa802f6d5613793e394726ec0e38979d621e835efaf23300259", &(0x7f0000002180)=""/165, 0x4}, 0x20) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000001ec0)=[{&(0x7f0000000140)={0x27, 0x1, 0x1, 0x6, 0x5, 0x80, "cd36e4ce3d34c2180178d9088f6d49d27a53fe275eb77e9ca5c5a8e94c7d91cfa89cac94420ea6f03ccb2370959ecd83921549d6cdeebd30332d2f5fad9ca9", 0x1a}, 0x60, &(0x7f0000000000)=[{&(0x7f00000001c0)="a9ccd5c793c3d83e3e5588d252cb541aa94c2e8fe0810783d9b76a4b8ffde2be51ab8e628ca3a91e162ec92a54274f30a310a88f0915d33e0c6efe3f0fe39c87ac4d0487e4ac1da757326a846a492c2472d51d0fc049a9cd29015f9de2ac7daf853a8385fc1b8fd7619bb2528d79aa9172b0a2b36e0a2c91c6d0654bf474164ca17c58528f4252847ffcaad5c83f844fab", 0x91}, {&(0x7f0000000280)="df361b506f5a07b689ddbc27a4df12e2795ed082b6c814d633d732c0696c5f61dfb2cd017e1759aa7ec1c048a73c6f6960c48ff78a0e198f5f6782b315536c60e4ca945af3bd3f1831a50aaaabe427daea40fe25c5976eca14fcbace71ca6f721c6d87f492479abc759016e45dd6037efdba4b44ec04b78f6d354dfb0e1ef39dd6107a69a78f6a18d83c340047b9d93d4cec55ce6e50b841ad5a3b949ed95f0022fb010e01caa1ec0928706e181ab9f37dfc5b941a41ee3d6bb15c20fb908ef86646ee25c1825a6a", 0xc8}, {&(0x7f0000000380)="744ce87c8cd6b6f64520462325e46652946d6bf3d95b0b77108f5f93e4665f4e81411fea445506f431d187df8f02c7322dfe109f1f96a18d67d26f0a26b0c2f364610b40283bd2910845f3515a3be78b5800fb4fcef32dd5e7c30d98692e448e0c456957a0df93481bf07169fc23731815844f1c18ef6f0273c90afa985207beeb07d47982beffd7b3", 0x89}], 0x3, 0x0, 0x0, 0x4004010}, {&(0x7f0000000440)={0x27, 0x0, 0x2, 0x7, 0x1f, 0x0, "caf02f132a387aa76fae27039e8c3d6f516478910647e8b57e01dcea93376a0cf4890262b05e5e31e9265f0534772c83b4114ae4ceb95e1d3d56a0cdc6b763", 0x1}, 0x60, &(0x7f00000000c0)=[{&(0x7f00000004c0)="06edd15721bb3e852c7a4a54ac35e21733c17b775d0dde3acffc8b91b222c725a340fccd807c042a8d3e5989e80cb590f191e9aef35a284501a0d0c7ee739f4fde7b", 0x42}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="f800000000000000100100001f000000663a7f1b0072e59fbb0aa5913307b89711fcd1c163e983053682766025e2d9d501bce71dc6aa0b240feb56bd5e703ac0ba91dda2ab5a41f4827073e0c3d8d756699e6b9c58b8d94f460dbab56abc86aee649d1bca23300c9d53c2ca73ba4078ce1874d52099607276729f0857892f640094839491013f9c27b3d2cba97e22a22c47a70fe700703ab5735d01f798ebf28acc1116d21aa0b194e99d07a725aecb8982974a793990aa8a4927f8b2eee3321b476d044b41d7ef584e64da3b949cb795025e06e2e3235a82dbce4622ce96ae35eed9ab8c44963aca81fb5cc3f0c5e5cc47d9ffcef7c0000"], 0xf8, 0x40}, {&(0x7f0000000640)={0x27, 0x1, 0x2, 0x4, 0x7f, 0x3f, "692ac0012dca769a594d057c865ddc5760939595165ac684305a1621a62c72cd9e3cf696cbe6bf26a367beca31fc384de7a9c7f17a999085cb3cb875df93d8", 0x32}, 0x60, &(0x7f0000000980)=[{&(0x7f00000006c0)="989fafcf08e88de2d496d57f3313d24bdfed319dde2218d893eca9ecaa0bc5596451397f166d8b8538c40d9fa0162a99f4f3bd6fdfb65f5615b0e900cf29e785eae69d68c97f311fa09e503fd208a6895358e0ba821c407f8d50c027513feb942520ae7f0dad09ae1fc84a29f8f37ceeb11edd7f96ad393304cd18aaea47cdf22405c5b8d3650f597e13fe2933bd61f8f4cb80a48dc9f7fa113e63d0671df16fc3ad10dd879753738ea28bb0e2d6ad1cc72bb73c4fe65353bca1dd63892d13aec51419cff239274c93dfec3ebffd8d014a07dae182eed2ee1fff667c1522eb00cf", 0xe1}, {&(0x7f00000007c0)="12a0dcc65eba595f7582e2c262b5c8ec95cc4305e5f0096d6b31763790e006bdca05ed3acc921ca9e959723262e48932d53e6b0342fa78ae5434d0b968a6983cc1ee0e6e95f15de3ac649da2fb10ac7b7498ddfe65fb9de4f60ab496364cac97bf25c41a0b806c6faeb672b8418c199e329ebb5ec6db4257cbb48ff4db5deee7e1e945310405e2b7685b8824de3634a84188eb3569b6ab754cbd", 0x9a}, {&(0x7f0000000880)="2125e12aede30a527e5bd7d29609df6046b0d0d221ffe0d4f06eebe1cbe6d69f88658a4d315c76853f2d97f21b93c2b377ca8ed30c7ea11748eb572933fb8e8bf55eede57ca338b6e88a4846e81aad668a5e7c7c9a59dc19d2ec4b9a837a2cfe3a8358f3ad46b234b210e3a0be2f35ddfb8b3c5872e26bd4905a2920c1f1ecbe5f8082c59f3438ad666202bf9f802e4281986fe88b061a04422c76f6eed6f8903f3ce9c66ad4815e097fa9096a5577e6da733779b884d9555518004b6b2fce9e335d93243b8a5898f6816820ae7f94290e77f67a545f222ffcd2b54f5d970b58f15c2186c08190f49c5b756b9e", 0x11d}, {&(0x7f0000000a40)="0cfacd0afac2d91daef28dc22db4ed7617b64b15cc0e24fa76564c8b775662e0ab9105988a44f9ba3c7e2b00b91cf3c5fdaf794f0440a07e242f41f388543a2e7f43e7a78db0e9c746677ed7deafb9e262f6d83cdcba9d696171e44ba622adac6975f49b1eb0a706ce93748f13db3fb32c4332e28bf3d7f017fb2008fc7b6ff87edf1022eba858f198837700912df2e3edd913d4abe6700e5f413cffcdddb818769cd06919f3f0d98bc9ec2fd24d46435b518aa810d799faf181eb7384f021006a20bed89958f381c58594ccf46a25126d7586d7567ee394aeb58d822d2d91836620", 0xe2}], 0x4, &(0x7f0000001fc0)=ANY=[@ANYBLOB="40000000000000000c010000f50c0000cc42fb678e2c9d4ca6bb0ec18ffaf0e1233160f1c4c48b6d4bafa93c5767157a49bcbb186958ca7b929ef260cfaffd0072dcce30d2618923bc84d7b8226d656feae64613cb1d57de2da109c7476bafed8c1487014642f0c9d6d1862604ecc8fde340846c86bc70e474dfbf48c350bea7dd2e85541531a4530aec9dc70069ebf0e1c41c7251745d11bbaaf5"], 0x40, 0x4800}, {&(0x7f0000000b40)={0x27, 0x0, 0x1, 0x5, 0x0, 0x4, "077cc07bfbf5837d2f971c6725d1ecbeb5efa9fdcfd95f028def160a38612811245415d7bea1b99310ced24aa0e27e29032562a6660b98f23b8663fd1653e1", 0x4}, 0x60, &(0x7f0000001d80)=[{&(0x7f0000000bc0)="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", 0x1000}, {&(0x7f0000001bc0)}, {&(0x7f0000001c00)="154b67de7da32ae079ebd0de124089cded0bffac616a6e154c9ee72bf530b7e19b9227fbb0735209dad91b7c4c23cedd93a594c72f0bac5f39e9c936e4ad461781083bb7a40b6e4b84dc21d8719232cc72c592deb4ea1884a1d90ab8fc188043a66e1edb9430ef8e2c78676ca58a3c78ba3d5daf61eea24a81d17dee48883d95eba2a65d0e6a3eca3b89fac8ea5ddf56c1a9440134a9141f25e20ef49b4f4593097b66d2c3d45961fc53174fda239c8599f560930a2246b7", 0xbb}, {&(0x7f0000001cc0)="8609056581addff9e70f12414c40225def932ea19b356e61819eb552aa15ab5314b5a8674fba83d1288d7d55e8926d3ade27468718e8d321c40b8e613733a3e88cb220ff69fa0fde221515255ff30de53455422292f03a2761d871f1d22ca3cbdc388c5996b21a2322a17e1e4f1619173ff0beb14437a868aac213cad44c3c19123a7581ef2ba9faf1bfffa4225f93c5ce0a8ab14b8c8a9a7230a00c7f537a4c9eb188531d7b4fc48d161518734224ed94403a8e734831cdde4952e822c61769", 0xc0}], 0x4, &(0x7f0000001dc0)={0xf0, 0x109, 0x4, "a353002b6fc09a1ae21a96a14320c16713d953f0fd1ee2000a5dabcc1ccdd275893c95edfde5eb10089610dabe787a5876e814fba2d25efb93c9846cc5a7014bf65bf7ff96b73456759fa863f5a3bd441b205a2a30c9e4fd1e35d0084350ff637c111de5a0fca0c740a5eb71510198a7852e735e4ab0aff693bd2193bef9980c0b74a298e2cd4614d6da28f0dc32f864ffae8772ad28fdb44357f24fe2951c8e2c0580a36dac2b2433320d59f0653e24a635e3438ea4c6afbe89ab28bc41f9cf4f6656927bc40cdfe6338890ad0bc97b0c80e355f28fc830797aec1971"}, 0xf0, 0x10}], 0x4, 0x4000000) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001bc0)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000002240)) 12:29:15 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, 0xffffffffffffffff, 0x80000) 12:29:15 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, 0xffffffffffffffff, 0x80000) [ 582.436746] BTRFS error (device loop5): superblock checksum mismatch 12:29:15 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, 0xffffffffffffffff, 0x80000) [ 582.493018] BTRFS error (device loop5): open_ctree failed 12:29:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:15 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000022030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:15 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 582.828126] BTRFS error (device loop5): superblock checksum mismatch [ 582.861202] BTRFS error (device loop5): open_ctree failed 12:29:15 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='/usr/sbin/ntpd\x00', 0xf, 0x2) 12:29:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x3, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe99b64a7b94410e2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x60, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0xdd6b, 0x45}}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x4}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x48b}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3f}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x4c9ff7cc}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x8001) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x3ff}]}, 0x2c}}, 0x0) 12:29:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:15 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000023030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:15 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r8, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r6, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r8, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b0e}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge_slave_1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x30004010) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x100000, 0x0) [ 583.139049] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 0 transid 0 /dev/loop4 [ 583.240562] BTRFS error (device loop5): superblock checksum mismatch [ 583.247341] BTRFS error (device loop5): open_ctree failed 12:29:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000000c0)={'wg1\x00', 0x0}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xdc, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x1e}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x54}, 0x2000c801) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x3ff}]}, 0x2c}}, 0x0) 12:29:16 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1_macvtap\x00', 0x10) [ 583.306558] BTRFS error (device loop5): superblock checksum mismatch 12:29:16 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900002c030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 583.359864] BTRFS error (device loop5): open_ctree failed 12:29:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 583.570274] BTRFS error (device loop5): superblock checksum mismatch 12:29:16 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000048030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 583.612867] BTRFS error (device loop5): open_ctree failed [ 583.659226] BTRFS error (device loop5): superblock checksum mismatch [ 583.724327] BTRFS error (device loop5): open_ctree failed 12:29:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x3ff}]}, 0x2c}}, 0x0) 12:29:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:16 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900004c030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) r2 = socket(0x23, 0x5, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4008000) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, 0x0, 0x0) r4 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, 0x0, 0x0) sendmsg$NL80211_CMD_SET_REG(r4, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x88, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x34}, @NL80211_ATTR_REG_RULES={0x68, 0x22, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x23}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x4}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x3f}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x9}, @NL80211_ATTR_FREQ_RANGE_END={0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1000}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xfffffffc}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x400}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x88}, 0x1, 0x0, 0x0, 0xc811}, 0x20048890) accept$packet(r2, &(0x7f0000000300), &(0x7f0000000340)=0x14) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x6, 0x9, 0x10001, 0x100, 0x2, 0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="38001200c046b18df04a2b91a61792848d48917008d0abe3f6b4e0ed844b8816068c2e353090c42e7dc9e9a073b0eb7ac6a1fe9651128b08ca9ae79130f8a248e95490a6403fd150aee68fa27b87cf8a9c19befa5db0da287411701297c0a1bb57a62c51e77ec0c643c89f7c90e998ce5b8b2cc7a97cc3ce2884e0b2b4dec6a000baaae967f59e0e9d0fbbb605dca852f07483955ab4343a6b94a6b07d56da81a5af8bef019d165165a5921698caa96bcb6918775e31ab7868ea7064deb33d737095a347cc4e13b7318ca1", @ANYRES16=r6, @ANYBLOB="010000000000000000003700000008000300", @ANYRES32=r8, @ANYBLOB="0c0099005103000047000000080026006c09000008005700ff030000"], 0x38}, 0x1, 0x0, 0x0, 0x4000014}, 0x0) 12:29:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x3ff}]}, 0x2c}}, 0x0) r4 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x11) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on,']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000080)='./bus/file0\x00') sendmsg$NL80211_CMD_SET_NOACK_MAP(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, r1, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x3}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x3f}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x8001}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x2a7}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x8}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xfffd}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180)='ethtool\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000010c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001100)={{{@in6=@private2, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001200)=0xe8) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000013c0)={&(0x7f0000001240)={0xe4, r5, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xd0}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xf4}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7f}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_LINKINFO_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x40}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="240000003d58451ded0a214b0a9ee6ac7562ac97173f1c", @ANYRES16=r5, @ANYBLOB="000428bd7000fddbdf251000000008000900c1ffffff0800090094ee0000"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 584.047438] BTRFS error (device loop5): superblock checksum mismatch [ 584.084577] BTRFS error (device loop5): open_ctree failed [ 584.121660] BTRFS error (device loop5): superblock checksum mismatch 12:29:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x5, 0x7b}}}}, [@chandef_params, @NL80211_ATTR_DURATION={0x8, 0x57, 0x3ff}]}, 0x30}}, 0x4000000) 12:29:17 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000060030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 584.202375] BTRFS error (device loop5): open_ctree failed 12:29:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:17 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000068030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 584.421463] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop5 12:29:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="05000000456d070000006317778c323623338d98fdcecd29c311a1d0c48d14e98bf1b1355b0ce8d25a2fa8f089eb53876325290291003161d84deb5690a394bec99d41579f4b439189871bc57043a84caa7f3f1fe79f95d1d54404000019d3a22d823f871dbeaed5b41b33f2ace8605636094e737269700aac1bee73ebfd1e0a64f2b4a9cc98b46eb6f0c7160c7712c0cf91de436ae278d33d668895df3644d931bd84016228a34b343eff6a331fa36748ae252f29765dc6a14ea8885a7b7b93b128b4ebf59fc4849775a3380286875cad2198ecc45dce2f5f9dc9e32baa0539155dcfc17eda2dcd8980", @ANYRES16=r1, @ANYBLOB="010000010000fddbdf2537000000080026006c09000008005700ff0300000800570000000000"], 0x2c}}, 0x0) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x24, r1, 0x8, 0x70bd26, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008010}, 0x200080c4) sendmsg(r0, &(0x7f0000000580)={&(0x7f00000000c0)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)="60755a459a55564e0a714b436511a0add941779ef9cf371117879f8303301b573aebc09133c92acc913ab2c7192983e3330974b02e0f3150f33808d2e64527", 0x3f}, {&(0x7f0000000140)="40d16db3160155ec1e006b16240689e4c4d7bec47c2514153fa64166567b245313", 0x21}, {&(0x7f0000000180)="aba2c6e1540c54b18c115c51930d091bb9d68c98", 0x14}, {&(0x7f0000000340)="b8bea1ec8013ca93f1fe0880fb2fa1cb5bfb347ac5c3bc2dcfdf9e14efbe7131d1232faa7f220eb3929894c4ed3ab4d1dbaff5f637650dbb51b53bc7f5de7fa75dfb64e2a151f0c5fc8222c5625e19cd70e514e3294b48d50e989681af34f5c8a94b182ea946ec55170a97624e83ddb7f6cf0deb78e544db11326c500df6f52301dd746e2b2cd23594db7680c49f0b7aa658976005a1e5245d92c42e", 0x9c}], 0x4, &(0x7f0000000400)=[{0xa8, 0x11, 0x8, "cc05de404bb125d4f5a86b2376b142692436b46395e27009b36e37bb6dca41d2a3f019917960713189ae7f9d17e105201ca1b4ded1d9cdf8d95bb098a8054bbcfa550c393e41374298b854713fb386e51266fbcfb3cd07aa989091cfbce09f92a3d59cfddce0494738fdc1d320a89c69c5f75c6c140343f8dd3abb97837192e1eb1291c1d81ec768db71a31c04931960ae87"}, {0xd8, 0x111, 0x8, "cf1a7c72417c51d36df04077eed9a74d83cac303630ab7a598a2f2ff2d69164552ee930a4c9801b5cfd75d115770e07d537515cb75d039b0f60c38327262bf142cd03a7ad6b703c5b02ef8a9893a218fc3189792630ad61e8e833625ac91adbdd46363ff8b5f4daf0bef6403145c34d2759499d5f0ca15c9ea4feaa3f57e2c3f68a03b79cd276223a27f474f8450b907a0e1bd04d7888d536e942c5071ea23dae3b2375c6e2613002237eb6da5b29c2737a2d582cd11ddacbd42725299d2a3140372"}], 0x180}, 0x200008c0) 12:29:17 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) r7 = socket(0x23, 0x5, 0x0) r8 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r8, 0xc0184900, &(0x7f0000000040)={0x5, 0x3d, 0x0, 0xffffffffffffffff}) r10 = dup(r9) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r10}) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000040)={r11}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={r11}) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 584.532814] BTRFS error (device loop5): superblock checksum mismatch [ 584.560324] BTRFS error (device loop5): open_ctree failed [ 584.574088] BTRFS error (device loop5): superblock checksum mismatch 12:29:17 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900006c030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 584.629044] BTRFS error (device loop5): open_ctree failed 12:29:17 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000003030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:17 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x80, 0x0) read$rfkill(r3, 0x0, 0xff02160) dup3(r0, r3, 0x80000) 12:29:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 584.799687] f2fs_msg: 152 callbacks suppressed [ 584.799700] F2FS-fs (loop3): Invalid log sectorsize (1811939337) [ 584.846147] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:29:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 584.889700] BTRFS error (device loop5): superblock checksum mismatch [ 584.912934] F2FS-fs (loop3): Unable to read 2th superblock [ 584.926463] BTRFS error (device loop5): open_ctree failed 12:29:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00', 0xf, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 584.941057] F2FS-fs (loop3): Invalid log sectorsize (1811939337) [ 584.955647] BTRFS error (device loop5): superblock checksum mismatch 12:29:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 584.987340] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 585.011306] BTRFS error (device loop5): open_ctree failed [ 585.026903] F2FS-fs (loop3): Unable to read 2th superblock [ 585.150749] F2FS-fs (loop3): Invalid log sectorsize (1811939337) [ 585.162053] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 585.192731] BTRFS error (device loop5): superblock checksum mismatch [ 585.209771] F2FS-fs (loop3): Unable to read 2th superblock [ 585.215572] F2FS-fs (loop3): Invalid log sectorsize (1811939337) [ 585.234015] BTRFS error (device loop5): open_ctree failed 12:29:18 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) init_module(&(0x7f0000000000)='*@\x00', 0x3, &(0x7f0000000040)='batadv0\x00') setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200), 0x0, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:29:18 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000074030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:18 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900007a030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200), 0x0, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={r0}) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x14, 0x0, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r4 = accept(r2, 0x0, &(0x7f0000000000)) recvfrom$l2tp6(r4, &(0x7f00000000c0)=""/55, 0x37, 0x2021, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x20) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r7, @ANYBLOB="f507000000000000000026"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r6, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r7, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x4000001) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB='K\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000300a606c342b3cf766dd6e8ff586c01e59cb4d10d421a66c6751e4b413cae49e461678200"/52, @ANYRES32=r5, @ANYBLOB="080026006c09000008005700ff030000"], 0x2c}}, 0x0) 12:29:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 585.565454] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop5 12:29:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 585.623295] BTRFS error (device loop5): superblock checksum mismatch 12:29:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e400001000000000000000400000000000020000000000000000000100000000000200000000000000001000000010000000100000010000000100000000", 0x51, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 585.690996] BTRFS error (device loop5): open_ctree failed [ 585.744597] BTRFS error (device loop1): superblock checksum mismatch [ 585.797802] BTRFS error (device loop1): open_ctree failed [ 585.830765] BTRFS error (device loop1): superblock checksum mismatch [ 585.871068] BTRFS error (device loop1): open_ctree failed 12:29:19 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x8, @mcast2, 0x101}, @in6={0xa, 0x4e24, 0x7fffffff, @private2={0xfc, 0x2, [], 0x1}, 0x80000000}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e22, @private=0xa010102}, @in6={0xa, 0x4e20, 0x1ff, @private2, 0xfb}, @in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @multicast2}, 0x3}], 0xa0) close(r5) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r7, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:19 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000070000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:29:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 586.367752] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 586.382815] BTRFS error (device loop5): superblock checksum mismatch 12:29:19 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000090000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300), 0x0, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 586.463474] BTRFS error (device loop5): open_ctree failed [ 586.475431] BTRFS error (device loop5): superblock checksum mismatch 12:29:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 586.540841] BTRFS error (device loop5): open_ctree failed 12:29:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:19 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r1, 0x0, 0xff02160) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20040084}, 0x800) sendmmsg(r0, &(0x7f000000bf40)=[{{&(0x7f0000000380)=@generic={0x0, "0fb99dc4c73e39d4c521b5a7b4442fcd843182a7de51ef8a0cb647945d5dcc1ad62a5c2df40fc068d2183b2f172eeca61b570251aed1edf078b970774c39c02f9da6116cceb1453121cfe4205f4f47f272bb2088da8bc88021eb32736f43e8e7c62b39a6de8d23605bfff4ec196802aaada6a2afd1ada242d7ecf9553b4e"}, 0x80, 0x0}}], 0x1, 0x0) [ 586.748878] BTRFS error (device loop5): superblock checksum mismatch [ 586.767034] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 586.811809] BTRFS error (device loop5): open_ctree failed 12:29:19 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8982, &(0x7f00000000c0)) r8 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)='bond0\x00', 0x0, 0x473a7e5a, 0x5}) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='veth1_to_batadv\x00', 0x10) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:19 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000000a0000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300), 0x0, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000440)={0x3b, 0x1, 0xfffffffc, 0xa, 0x5, 0x8e03, 0x0, 0x2, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7b, &(0x7f0000000280)={r3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={r3, 0x8, 0xfeff, 0x7, 0x3, 0x4}, &(0x7f00000000c0)=0x14) 12:29:20 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000000f0000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 587.297328] BTRFS error (device loop5): superblock checksum mismatch [ 587.305873] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 587.374269] BTRFS error (device loop5): open_ctree failed [ 587.395309] BTRFS error (device loop5): superblock checksum mismatch [ 587.421093] BTRFS error (device loop5): open_ctree failed 12:29:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x0, 0x4000, 0x8, &(0x7f0000ffa000/0x4000)=nil) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x17, 0x0, 0x81}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2c0900, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000000c0)) 12:29:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 12:29:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 587.651402] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 587.667065] BTRFS error (device loop1): superblock checksum mismatch [ 587.686425] BTRFS error (device loop1): open_ctree failed [ 587.697043] BTRFS error (device loop1): superblock checksum mismatch [ 587.741068] BTRFS error (device loop1): open_ctree failed 12:29:20 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000140000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 12:29:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:20 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r2 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, 0x0, 0x0) r3 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, 0x0, 0x0) ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) sendmsg$BATADV_CMD_TP_METER(r7, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x6c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4008010}, 0x40800) 12:29:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 12:29:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x17, 0x0, 0x81}) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @none, 0x40}, 0xa) 12:29:21 executing program 0: ioctl$mixer_OSS_GETVERSION(0xffffffffffffffff, 0x80044d76, &(0x7f0000000000)) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x5, 0x0, 0x4, 0x5, 0xffff}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r6, 0x3, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r3, 0x8, 0x70bd26, 0x10000, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x10000, 0x52}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000440)={0x1, 0x2d, 0x14, 0xa, 0xb, 0x81, 0x0, 0x9d}) [ 588.212785] BTRFS error (device loop1): superblock checksum mismatch [ 588.220507] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 588.261654] BTRFS error (device loop1): open_ctree failed [ 588.276965] BTRFS error (device loop1): superblock checksum mismatch 12:29:21 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000300000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da8", 0x129, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x17, 0x0, 0x81, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x40000, 0x0) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000003f0706030000000000000000000a0000060900020073797a3100000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setresuid(0x0, r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) stat(&(0x7f0000002500)='./file0\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000025c0), &(0x7f0000002600)=0x0, &(0x7f0000002640)) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r8) write$FUSE_DIRENTPLUS(r1, &(0x7f0000002680)={0x5e8, 0x0, 0x0, [{{0x5, 0x3, 0x8, 0x9, 0x1, 0x498, {0x5, 0xfffffffffffffffd, 0x6150, 0x6, 0x8fce, 0x80, 0x0, 0x5, 0x1, 0xa000, 0x4a, 0x0, 0x0, 0x80000000, 0x7fff}}, {0x0, 0x4, 0x11, 0x2, '/dev/dlm-control\x00'}}, {{0x5, 0x2, 0x6947, 0x3f, 0x7, 0x0, {0x4, 0x177f, 0x2, 0x4, 0x1f, 0x1, 0xfffff801, 0x8000, 0x1ff, 0x4000, 0x3, 0xffffffffffffffff, 0x0, 0x2, 0x9}}, {0x5, 0x9, 0x11, 0x1ff, '/dev/dlm-control\x00'}}, {{0x2, 0x2, 0x7, 0x6, 0x0, 0xada, {0x5, 0x401, 0x3, 0x0, 0x80, 0x4, 0x40, 0x1, 0xc30, 0xc000, 0x7, 0x0, 0xee01, 0x4, 0xffffffff}}, {0x4, 0x2, 0x4, 0xcc, '+]}{'}}, {{0x6, 0x0, 0xffff, 0x1, 0x4, 0x1, {0x1, 0x10001, 0x2, 0x9, 0x7d1c, 0x0, 0x117, 0x0, 0x15caa527, 0x2000, 0xfffffc00, 0xffffffffffffffff, 0xee01, 0x4, 0x5}}, {0x5, 0x5, 0x4, 0xffff0000, '}}-['}}, {{0x1, 0x2, 0x2, 0x4, 0x3, 0x0, {0x4, 0x7, 0xfff, 0x6, 0x25, 0xffff, 0x0, 0x3f, 0x0, 0x4000, 0x9, 0x0, 0x0, 0x4, 0x7}}, {0x6, 0x5, 0x5, 0x6, ')-@]('}}, {{0x6, 0x1, 0x400, 0x9c0f, 0xbbc4, 0x582, {0x6, 0x800, 0x401, 0xffffffff, 0x2, 0x1, 0xfffffffe, 0x4a, 0x9, 0x8000, 0x1, r2, 0x0, 0x9d22, 0x1}}, {0x1, 0x20, 0x11, 0x4, '/dev/dlm-control\x00'}}, {{0x4, 0x1, 0x6, 0x3ff, 0x80, 0xf5d, {0x1, 0x32, 0x3, 0x9, 0x0, 0x46258000000, 0x80000000, 0x9, 0x1, 0x4000, 0x1f, 0xffffffffffffffff, r4, 0x1, 0x7fffffff}}, {0x1, 0x100000001, 0x8, 0x868, '%}-&\xf8\xbe))'}}, {{0x1, 0x2, 0x4fc, 0x3, 0x3f, 0x4, {0x4, 0x9, 0x2f, 0x1, 0xc3, 0x5, 0x1, 0x2, 0x6, 0x6000, 0x7ff, 0xee00, r5, 0x7, 0xffffff80}}, {0x0, 0x20, 0xc, 0x5f, 'u:-+:]#%]/@-'}}, {{0x5, 0x3, 0x3f, 0x3ff, 0xfffffff9, 0x6, {0x2, 0x8001, 0x6, 0x3, 0x6, 0x8, 0x7, 0x0, 0xffffff20, 0x4000, 0x0, r6, r8, 0x0, 0x967}}, {0x1, 0x7, 0x3, 0xa9, '-+{'}}]}, 0x5e8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup2(r9, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r11, 0x4028700f, &(0x7f0000000000)={0x1, 0x3, {0x100013, 0x1f, 0x5, 0x18, 0x9, 0x2, 0x10000000, 0xe6}}) [ 588.342174] BTRFS error (device loop1): open_ctree failed 12:29:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 12:29:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 12:29:21 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000003e0000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 588.593064] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 588.593230] BTRFS error (device loop1): superblock checksum mismatch [ 588.640635] BTRFS error (device loop1): open_ctree failed [ 588.651208] BTRFS error (device loop1): superblock checksum mismatch [ 588.723300] BTRFS error (device loop1): open_ctree failed 12:29:21 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x24, r2, 0x711, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20202400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x202, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x83}]}, 0x1c}, 0x1, 0x0, 0x0, 0xa042ac3df9cd03cb}, 0x10040000) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x17, 0x0, 0x81}) 12:29:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:21 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000004d0000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 588.953764] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 588.971538] BTRFS error (device loop1): superblock checksum mismatch 12:29:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 589.020908] BTRFS error (device loop1): open_ctree failed [ 589.042239] BTRFS error (device loop1): superblock checksum mismatch 12:29:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x24, r2, 0x711, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20202400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x202, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x83}]}, 0x1c}, 0x1, 0x0, 0x0, 0xa042ac3df9cd03cb}, 0x10040000) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x17, 0x0, 0x81}) [ 589.081659] BTRFS error (device loop1): open_ctree failed 12:29:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:22 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000530000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 589.248756] BTRFS error (device loop5): superblock checksum mismatch [ 589.268076] BTRFS error (device loop5): open_ctree failed [ 589.392693] BTRFS error (device loop1): superblock checksum mismatch [ 589.409968] BTRFS error (device loop1): open_ctree failed 12:29:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) 12:29:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12a, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:22 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r2 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, 0x0, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x100000, 0x0) 12:29:22 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000630000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 589.897265] f2fs_msg: 123 callbacks suppressed [ 589.897281] F2FS-fs (loop3): Invalid log sectors per block(99) log sectorsize(9) [ 589.929625] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:29:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 589.944021] BTRFS error (device loop1): superblock checksum mismatch [ 589.953158] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 589.974512] F2FS-fs (loop3): Unable to read 2th superblock [ 590.003091] F2FS-fs (loop3): Invalid log sectors per block(99) log sectorsize(9) [ 590.014547] BTRFS error (device loop1): open_ctree failed [ 590.033576] BTRFS error (device loop1): superblock checksum mismatch [ 590.035268] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:29:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000440)={0x0, 0x0, 0x1, 0x1f, 0x3, 0x81, 0x6}) r1 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, 0x0, 0x0) accept4$netrom(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @remote, @rose, @bcast, @default, @rose, @default, @netrom]}, &(0x7f0000000000)=0x48, 0x81400) [ 590.064812] BTRFS error (device loop1): open_ctree failed [ 590.076570] F2FS-fs (loop3): Unable to read 2th superblock 12:29:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12a, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:23 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000003d00000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x17, 0x0, 0x81}) r0 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, 0x0, 0x0) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000480)={0xa6c, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xb, 0x35}}}}, [@NL80211_ATTR_TX_RATES={0x17c, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x20, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x9, 0x7f8, 0xffff, 0x6, 0x2, 0x6, 0x6]}}]}, @NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x7, 0x1, [0x48, 0x6c, 0x4]}]}, @NL80211_BAND_60GHZ={0x34, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x28, 0x2, [{0x2, 0x7}, {0x1, 0x2}, {0x3, 0x7}, {0x5}, {0x4, 0x8}, {0x1, 0xa}, {0x1, 0x2}, {0x6, 0x4}, {0x2, 0x1}, {0x7, 0x9}, {0x2, 0x4}, {0x1, 0x1}, {0x6, 0x9}, {0x7, 0x7}, {0x1}, {0x0, 0x7}, {0x1, 0x9}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x9}, {0x1, 0x4}, {0x1, 0x9}, {}, {0x0, 0xa}, {0x7, 0x1}, {0x7, 0x2}, {0x0, 0x9}, {0x5, 0x2}, {0x4, 0x1}, {0x6}, {0x3, 0x5}, {0x5, 0x5}, {0x0, 0x7}, {0x5, 0x9}, {}, {0x4, 0x5}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_60GHZ={0x9c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x20, 0x1, [0x12, 0x12, 0x12, 0x1, 0x18, 0x2, 0xb0, 0x6c, 0x36, 0x0, 0x2, 0x0, 0x60, 0x9, 0x6c, 0xc, 0xb, 0x48, 0xb, 0x1b, 0xc, 0x16, 0x6, 0x6, 0x3, 0xc, 0x6c, 0x24]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xc51, 0x100, 0x24, 0x1, 0x200, 0x7, 0x8, 0x200]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x33, 0x2, [{0x7, 0x2}, {0x5, 0x8}, {0x0, 0x5}, {0x6}, {0x6}, {0x7, 0x9}, {0x7, 0x9}, {0x5, 0x9}, {0x6, 0x5}, {0x1, 0x5}, {0x4, 0x9}, {0x5, 0x9}, {0x3, 0x8}, {0x5, 0x2}, {0x4, 0x8}, {0x4}, {0x0, 0x2}, {0x2, 0x8}, {0x5, 0x8}, {0x5, 0x3}, {0x4, 0x4}, {0x1, 0x2}, {0x2, 0x8}, {0x6, 0x2}, {0x2, 0x1}, {0x1, 0x4}, {0x0, 0x7}, {0x7}, {0x4, 0xa}, {}, {0x7, 0xa}, {0x6, 0x7}, {0x5, 0x1}, {0x3, 0x5}, {0x1, 0x8}, {0x3, 0x9}, {0x7, 0x5}, {0x4, 0x4}, {0x5, 0x6}, {0x4, 0x8}, {0x1, 0x5}, {0x1, 0x2}, {0x4}, {0x0, 0x1}, {0x6, 0x8}, {0x3, 0x3}, {0x5, 0x3}]}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7f, 0x7d0, 0x5, 0x776, 0x1, 0x8000, 0xb660, 0x6]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_60GHZ={0x7c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x3d, 0x2, [{0x6, 0x3}, {0x2, 0x7}, {0x6, 0x5}, {0x6, 0x5}, {0x0, 0x9}, {0x3, 0x4}, {0x7, 0x3}, {0x0, 0x2}, {0x7, 0x6}, {0x4, 0x6}, {0x2, 0x5}, {0x3}, {}, {0x3, 0x9}, {0x6}, {0x2, 0x7}, {0x4, 0x8}, {0x3, 0x2}, {0x6, 0x1}, {0x1, 0x1}, {0x3}, {0x4, 0x9}, {0x1, 0x9}, {0x6, 0x1}, {0x7}, {0x7, 0x5}, {0x2, 0x4}, {0x4, 0xa}, {}, {0x2}, {}, {0x6}, {0x3, 0x5}, {0x7, 0x2}, {0x7, 0x3}, {0x0, 0x1}, {0x3, 0x7}, {0x0, 0x1}, {0x3, 0x1}, {0x7, 0x2}, {0x0, 0x4}, {0x4, 0x3}, {0x3, 0x8}, {0x2, 0x3}, {0x5, 0x3}, {0x4, 0x6}, {0x4}, {0x4, 0x4}, {0x6, 0x8}, {0x2, 0x6}, {0x7, 0x1}, {0x4, 0x9}, {0x4}, {0x5, 0x5}, {0x4, 0x2}, {0x6, 0xa}, {0x7, 0x3}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x2, 0x6, 0xb, 0x48, 0x8f4b00e96b7c2aff, 0x6, 0x1b, 0x36, 0x6c, 0x60, 0x5, 0x16, 0x19, 0x48, 0x30, 0x18, 0x4, 0x0, 0x1, 0x4, 0x60, 0xb, 0x5, 0x1, 0x1b, 0x1b, 0x5, 0xc, 0x48, 0xb, 0xa, 0x16]}, @NL80211_TXRATE_LEGACY={0xb, 0x1, [0x4, 0x16, 0xc, 0x5, 0x16, 0x60, 0x60]}]}]}, @NL80211_ATTR_TX_RATES={0x310, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x4c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x400, 0x1ff, 0x80, 0x6, 0x4, 0x8, 0x3]}}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x1b, 0x36, 0x4, 0x3, 0x18, 0x4, 0xc, 0x5, 0x12, 0x9, 0x48, 0x4, 0x1b, 0x12, 0x4, 0x2, 0x1, 0x12, 0x4, 0x30, 0xb, 0x9f2e7424234e52a8, 0x24]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0xe, 0x1, [0x1b, 0x9, 0x24, 0x1, 0x3, 0x36, 0x5, 0x4, 0x2, 0x48]}]}, @NL80211_BAND_60GHZ={0x2c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x401, 0x3a1, 0x3, 0x6, 0x9, 0x9, 0x7, 0x200]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xff, 0xffff, 0x1bf, 0x200, 0x6d, 0x400, 0x0, 0x4]}}]}, @NL80211_BAND_5GHZ={0x20, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x20, 0x5, 0x0, 0x1, 0x3, 0xff, 0xe5a9]}}]}, @NL80211_BAND_60GHZ={0x6c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x14, 0x1, [0xb, 0x6, 0xc, 0x60, 0x9, 0x60, 0x5, 0x1b, 0x30, 0x30, 0x1, 0x36, 0x30, 0x30, 0x30, 0x18]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x44, 0x2, [{0x1, 0x8}, {0x2, 0x7}, {0x1, 0x4}, {0x2, 0x5}, {0x4, 0x3}, {0x0, 0x7}, {0x1, 0x2}, {0x2, 0x5}, {0x4, 0x7}, {0x0, 0x5}, {0x0, 0xa}, {0x0, 0x6}, {0x6}, {0x1}, {0x1, 0x8}, {0x0, 0x3}, {0x0, 0x9}, {0x7, 0x6}, {0x0, 0x4}, {0x1}, {0x0, 0x7}, {0x7, 0x4}, {0x5, 0x5}, {0x2, 0x7}, {0x5, 0x4}, {0x4, 0x4}, {0x0, 0x5}, {0x2, 0x4}, {0x1, 0x2}, {0x4, 0x9}, {0x3, 0x6}, {0x7, 0x5}, {0x7, 0xa}, {0x5, 0x7}, {0x1}, {0x3, 0x4}, {0x4, 0x6}, {0x0, 0x9}, {0x3, 0x2}, {0x1, 0x4}, {0x0, 0x5}, {0x1, 0x8}, {0x2, 0x9}, {0x0, 0x4}, {0x7, 0x4}, {0x7, 0x7}, {0x3, 0x3}, {0x3, 0x6}, {0x4, 0x2}, {0x1, 0xa}, {0x0, 0x2}, {0x0, 0x9}, {0x3, 0x4}, {0x4, 0x5}, {0x7, 0x3}, {0x2}, {0x3, 0x6}, {0x7, 0x2}, {0x1, 0x6}, {0x2, 0x2}, {0x1, 0x7}, {0x3, 0x4}, {0x2, 0x4}, {0x1, 0x3}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_2GHZ={0xd0, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x7f, 0x2, 0x1, 0x6, 0x4, 0x132f, 0x6]}}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x30, 0x12, 0x5, 0x1, 0x12, 0x24, 0x17, 0x48, 0x6c, 0x60, 0xc, 0x18, 0x1, 0x12, 0x30, 0x5, 0x6c, 0xc, 0x6c, 0x16, 0x24]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x7, 0x8, 0xffff, 0x5, 0xed5, 0x8001, 0x1ec]}}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0xb, 0x30, 0x9, 0x48, 0x3, 0x4, 0x4, 0x12, 0x36, 0x2, 0x18, 0x2, 0x4bbbb537c9a0357, 0x6, 0xc, 0x24, 0x6, 0x1b, 0x24, 0x12, 0x6c, 0x1, 0x16, 0x24, 0x2]}, @NL80211_TXRATE_HT={0x28, 0x2, [{0x4}, {0x0, 0x6}, {0x0, 0x8}, {0x7, 0x8}, {0x1}, {0x2, 0x2}, {0x7, 0x6}, {0x0, 0x7}, {0x7, 0x4}, {0x1, 0x1}, {0x1, 0x9}, {0x2, 0x3}, {0x5}, {0x1, 0x6}, {0x3, 0x2}, {0x1, 0x5}, {0x1, 0xa}, {0x7, 0x5}, {0x5, 0x7}, {0x4, 0xa}, {0x3, 0x6}, {0x1, 0x7}, {0x5, 0x1}, {0x0, 0x1}, {0x6, 0x3}, {0x7}, {0x7, 0x2}, {0x0, 0x8}, {0x3, 0x8}, {0x7, 0x8}, {0x4}, {0x0, 0x7}, {0x2, 0x6}, {0x6, 0x9}, {0x7, 0x3}, {0x3, 0x7}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8001, 0xb729, 0x7, 0x5b40, 0x20, 0xe3, 0x7f, 0x6]}}, @NL80211_TXRATE_HT={0x29, 0x2, [{0x1, 0x3}, {0x6, 0x6}, {0x2, 0x2}, {0x5, 0x1}, {0x5}, {0x7, 0x4}, {0x2, 0x4}, {0x7}, {0x2, 0x3}, {0x2, 0x3}, {0x6, 0x4}, {0x7, 0x3}, {0x5, 0x1}, {0x6, 0x9}, {0x1, 0xa}, {0x7, 0x2}, {0x7, 0x5}, {0x7, 0x4}, {0x4, 0x9}, {0x7, 0x5}, {0x1, 0x6}, {0x2, 0x4}, {0x5, 0x9}, {0x3, 0x4}, {0x5, 0x4}, {0x1, 0x6}, {0x5, 0x1}, {0x5, 0x4}, {0x7, 0x2}, {0x1, 0xa}, {0x1, 0xa}, {0x1, 0x7}, {0x3, 0x5}, {0x0, 0x2}, {0x1, 0xa}, {0x0, 0xa}, {0x7, 0x5}]}]}, @NL80211_BAND_5GHZ={0x78, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x24, 0x1, [0x24, 0x30, 0x9, 0x1b, 0x1, 0x75, 0x12, 0x6, 0x18, 0x2, 0xc, 0x2, 0xb, 0x16, 0x1b, 0x5, 0x2, 0xc, 0x5, 0x4a, 0x16, 0x12, 0x12, 0x1, 0x18, 0x9, 0x1b, 0x6c, 0x6c, 0x6c, 0x4, 0x3]}, @NL80211_TXRATE_HT={0x47, 0x2, [{0x7, 0x4}, {0x4}, {0x2, 0x7}, {0x6, 0x8}, {0x3, 0x7}, {0x1, 0x9}, {0x0, 0xa}, {0x2, 0x5}, {0x5, 0x7}, {0x3, 0x4}, {0x0, 0x9}, {0x0, 0xa}, {0x2, 0xa}, {0x3, 0x7}, {0x6, 0x8}, {0x6}, {0x0, 0x8}, {0x5, 0x9}, {0x6, 0x5}, {0x7, 0x7}, {0x4, 0x3}, {0x2, 0x7}, {0x5}, {0x0, 0x2}, {0x1}, {0x7, 0x3}, {0x4, 0x2}, {0x6, 0x1}, {0x5, 0x8}, {0x6, 0x5}, {}, {0x1, 0xa}, {0x0, 0x6}, {0x7, 0x2}, {0x6, 0x2}, {0x0, 0x4}, {0x2, 0x5}, {0x7}, {0x0, 0x9}, {0x3, 0x2}, {0x4, 0xa}, {0x1, 0x5}, {0x7}, {0x0, 0xa}, {0x3, 0x6}, {0x4}, {0x0, 0x4}, {0x1, 0xa}, {0x7, 0x9}, {0x3, 0x1}, {0x1, 0x7}, {0x7}, {0x2, 0x5}, {0x3, 0x8}, {0x3, 0x9}, {0x1, 0xa}, {0x5, 0x5}, {0x3, 0x7}, {0x1, 0x4}, {0x4, 0x8}, {0x6, 0x2}, {}, {0x6, 0x1}, {0x7, 0x2}, {0x6, 0x2}, {0x4, 0x5}, {0x1, 0x8}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0xb4, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x200, 0x9, 0x401, 0x8ed5, 0x8, 0x9, 0x8, 0x7fff]}}, @NL80211_TXRATE_LEGACY={0x6, 0x1, [0x5, 0x24]}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x1b, 0x5, 0x1b, 0x1b, 0x12, 0x24, 0x24, 0x6c, 0xc, 0x5, 0x24, 0x5, 0x48, 0x6, 0x36, 0x70, 0x1, 0xc, 0x0, 0x5, 0x6c, 0x16, 0x0, 0x1]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0xf, 0x2, [{0x4}, {0x6, 0x1f}, {0x3, 0x5}, {0x3, 0xa}, {0x5, 0x5}, {0x6, 0x4}, {0x7, 0x2}, {0x7, 0x6}, {0x7, 0x5}, {0x4}, {0x0, 0x6}]}, @NL80211_TXRATE_HT={0x46, 0x2, [{}, {0x1, 0xa}, {0x6, 0x9}, {0x7, 0x5}, {0x3, 0x7}, {0x6, 0x2}, {0x1, 0xa}, {0x4, 0x9}, {0x1, 0x3}, {0x3, 0x6}, {0x5, 0x2}, {0x5}, {0x3, 0x8}, {0x2, 0x2}, {0x1, 0x2}, {0x2, 0x1}, {0x7, 0x7}, {0x3, 0x4}, {0x0, 0x6}, {0x4, 0x7}, {0x3}, {0x6}, {0x2, 0x9}, {0x2, 0x7}, {0x1}, {0x2}, {0x0, 0x4}, {0x1}, {0x2, 0x6}, {0x5}, {0x2, 0xa}, {0x0, 0x4}, {0x2, 0x3}, {0x1, 0x2}, {0x1, 0x3}, {0x5, 0x6}, {0x4, 0xa}, {0x5, 0x8}, {0x2, 0x5}, {0x0, 0x7}, {0x1, 0x5}, {0x3, 0x3}, {0x0, 0x4}, {0x0, 0x9}, {0x5, 0x5}, {0x5, 0x7}, {0x0, 0x2}, {0x0, 0x2}, {0x2, 0x2}, {0x2, 0x2}, {0x3}, {0x1, 0x6}, {0x2, 0x8}, {0x0, 0x2}, {0x1, 0xa}, {0x0, 0x4}, {0x0, 0x2}, {0x1, 0x7}, {0x2, 0x9}, {0x6, 0xa}, {0x4, 0x3}, {0x0, 0x2}, {0x5, 0xa}, {0x0, 0x3}, {0x7, 0x1}, {0x4, 0x1}]}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x36, 0x2, 0x3, 0x4, 0x60, 0x12, 0x1, 0x36, 0x16, 0x1b, 0x2, 0x1d, 0x3, 0x30, 0x3, 0x16, 0x16, 0x30, 0x30]}]}, @NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}, @NL80211_ATTR_TX_RATES={0x2d4, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xf4, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x3, 0x6c, 0x4, 0x1b, 0x30, 0x24, 0x5, 0x36, 0x5, 0x5, 0xb, 0x0, 0x9, 0x30, 0x4, 0x18, 0x12, 0x18, 0x5, 0x48, 0x37, 0x9, 0x60, 0x1b]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xc16, 0x1f, 0x644d, 0x1, 0x6, 0x8000, 0x81, 0x80]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x10, 0x2, [{0x7, 0x3}, {0x6, 0x1}, {0x5, 0x1}, {0x6, 0x2}, {0x4, 0x9}, {0x0, 0x1}, {0x1, 0x3}, {0x0, 0x1}, {0x1, 0x4}, {0x1, 0x4}, {0x1, 0x2}, {0x7}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x20, 0x4, 0xfff, 0x9, 0x7f, 0xecf, 0x8, 0x4]}}, @NL80211_TXRATE_HT={0x43, 0x2, [{0x0, 0x7}, {0x5, 0x6}, {0x1, 0x2}, {0x4}, {0x5, 0x6}, {0x6, 0x7}, {0x1, 0x2}, {0x5, 0x5}, {0x7, 0x4}, {0x2}, {0x0, 0x5}, {0x0, 0x17}, {0x5, 0x7}, {0x2, 0x7}, {0x1, 0x1}, {0x0, 0x3}, {0x6, 0x3}, {0x3, 0x7}, {0x6, 0x8}, {0x4, 0x2}, {0x3, 0x6}, {0x4, 0xa}, {0x6, 0x1}, {0x7, 0x8}, {0x4, 0x7}, {0x2, 0x6}, {0x6, 0x6}, {0x3, 0x3}, {0x1, 0x4}, {0x2, 0x4}, {0x0, 0x1}, {0x6, 0x1}, {0x4, 0x1}, {0x3, 0x3}, {0x7, 0x4}, {0x7, 0x3}, {0x6, 0x3}, {0x2, 0x3}, {0x0, 0x6}, {0x5, 0x2}, {0x7, 0x8}, {0x2, 0x6}, {0x5, 0x6}, {0x1, 0x9}, {0x0, 0x1}, {0x7, 0x2}, {0x0, 0xa}, {0x7, 0x1}, {0x5, 0x9}, {0x5, 0x7}, {0x7, 0x2}, {0x2, 0x3}, {0x6, 0x3}, {0x0, 0x5}, {0x7, 0x4}, {0x7, 0x6}, {0x0, 0x3}, {0x7, 0x3}, {0x4, 0x9}, {0x4, 0x5}, {0x2}, {0x0, 0x5}, {0x0, 0xa}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x16, 0x2, [{0x7, 0x6}, {0x7}, {0x1, 0x3}, {0x5, 0x3}, {0x3}, {0x1, 0x9}, {0x2, 0x2}, {0x3, 0x2}, {0x0, 0x6}, {0x4, 0x6}, {0x6, 0x7}, {0x2, 0x5}, {0x7, 0x3}, {0x2, 0x9}, {0x4, 0x7}, {0x4, 0x9}, {0x4, 0x3}, {0x2, 0x9}]}, @NL80211_TXRATE_HT={0x28, 0x2, [{0x4, 0x8}, {0x4, 0x9}, {0x1, 0x3}, {0x0, 0x1}, {0x6, 0x1}, {0x6, 0x6}, {0x1, 0x1}, {0x0, 0x4}, {0x6, 0x5}, {0x4, 0x4}, {0x6, 0x3}, {}, {}, {0x2, 0x3}, {}, {0x1, 0x5}, {0x6, 0x3}, {0x7, 0x8}, {0x4, 0x8}, {0x2, 0x8}, {0x0, 0x6}, {0x2, 0x1}, {0x5, 0x6}, {0x0, 0x3}, {0x5, 0x7}, {0x6, 0x6}, {0x2, 0xa}, {0x5, 0x7}, {0x2}, {0x3, 0x3}, {0x6, 0x1}, {0x2, 0x6}, {0x3, 0x2}, {0x3, 0x7}, {0x6, 0x6}, {0x3, 0x8}]}]}, @NL80211_BAND_5GHZ={0x74, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x9114, 0x5, 0x7, 0x2, 0x4dd1, 0x7ff, 0x7, 0x7f]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8000, 0xff7f, 0x200, 0x1, 0x4c9, 0xda9f, 0x0, 0x2]}}, @NL80211_TXRATE_HT={0x21, 0x2, [{0x5, 0x1}, {0x2}, {0x4, 0x3}, {0x7, 0x8}, {0x1, 0x9}, {0x1, 0x2}, {0x6, 0x2}, {0x1, 0x6}, {0x1, 0x5}, {0x0, 0x5}, {0x6, 0xa}, {0x7, 0x3}, {0x4, 0x3}, {0x1, 0xa}, {0x6}, {0x7, 0x4}, {0x7, 0x9}, {0x0, 0x8}, {0x2}, {0x3, 0x9}, {0x4, 0x3}, {0x3, 0x2}, {0x2, 0x9}, {0x1, 0x5}, {0x7, 0x4}, {0x6, 0xa}, {0x5, 0x3}, {0x5, 0x4}, {0x0, 0xa}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x0, 0x5, 0x2, 0x9f, 0x5, 0x38b8, 0x4]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_6GHZ={0x120, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x16, 0x5, 0x65, 0x6c, 0x22, 0xc, 0xc, 0xc, 0x35, 0x1c, 0x18, 0x60, 0x2, 0x18, 0x1b, 0x1, 0x6c, 0x0, 0xc, 0xc, 0x1, 0x2, 0x10, 0x5, 0xb, 0x60]}, @NL80211_TXRATE_HT={0x16, 0x2, [{0x7, 0x6}, {0x5}, {0x5}, {0x2, 0x6}, {}, {0x1, 0x6}, {0x4, 0x3}, {0x4, 0x3}, {0x3, 0x2}, {0x0, 0x8}, {0x2, 0x4}, {0x2, 0x9}, {0x7, 0x1}, {0x5, 0x2}, {0x4, 0x3}, {0x0, 0x4}, {0x0, 0x8}, {0x1, 0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x400, 0x1, 0x6, 0x7fff, 0xc2, 0x6, 0x101]}}, @NL80211_TXRATE_LEGACY={0x18, 0x1, [0x1b, 0x12, 0x6, 0x1b, 0x48, 0x4, 0x16, 0x2, 0x30, 0x6c, 0xc, 0x30, 0x60, 0x9, 0x6c, 0x18, 0x36, 0x46, 0x36, 0x9]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0xb, 0x3, 0x36, 0x3, 0x2, 0x16, 0x5, 0x2, 0x6c, 0x60, 0x6, 0x0, 0x6c]}, @NL80211_TXRATE_HT={0x1a, 0x2, [{0x6, 0x6}, {0x3, 0x1}, {0x1, 0x6}, {0x4, 0x3}, {}, {}, {0x7, 0x3}, {0x7, 0x1}, {0x7, 0x8}, {0x6, 0x9}, {0x6, 0x5}, {0x5, 0x4}, {0x0, 0xa}, {0x0, 0x8}, {0x0, 0xa}, {0x3, 0xa}, {0x0, 0x6}, {0x2, 0x2}, {0x1}, {0x7, 0x7}, {0x0, 0x4}, {0x6, 0x2}]}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x30, 0x9, 0x6, 0xc, 0x1b, 0x1f, 0xb, 0x48, 0x6, 0x1b, 0x1b, 0x33, 0x36, 0x18, 0xb]}, @NL80211_TXRATE_HT={0x46, 0x2, [{0x6, 0x2}, {0x5, 0x3}, {0x3, 0x6}, {0x7, 0x3}, {0x1, 0x1}, {0x0, 0x5}, {0x5, 0xa}, {0x0, 0x8}, {0x2, 0x7}, {0x5, 0x9}, {0x3, 0x4}, {0x5, 0x6}, {0x7, 0x8}, {0x1, 0x2}, {0x7, 0x9}, {0x6, 0x8}, {0x1, 0x2}, {0x0, 0x1}, {0x1, 0xa}, {0x2, 0xa}, {0x2, 0xa}, {0x7, 0x9}, {0x1, 0x6}, {0x6, 0x2}, {0x2, 0x5}, {0x0, 0x1}, {}, {0x6, 0x4}, {0x4, 0x5}, {}, {0x3, 0x1}, {0x5, 0x4}, {0x6, 0x5}, {0x6, 0x5}, {0x4, 0x4}, {0x1, 0x2}, {0x0, 0x8}, {0x0, 0x2}, {0x5, 0x2}, {0x6}, {0x5, 0x7}, {0x2, 0x6}, {0x1, 0x6}, {0x7}, {0x6, 0x4}, {0x0, 0xa}, {0x7, 0x8}, {0x4, 0x1}, {0x1, 0x2}, {0x4, 0x6}, {0x6, 0x2}, {0x0, 0x9}, {0x1, 0x3}, {}, {0x1, 0x8}, {0x1, 0x7}, {0x2, 0x7}, {0x1, 0x4}, {0x6}, {0x7, 0x1}, {0x7, 0x2}, {0x1, 0x1}, {0x7, 0x8}, {0x1, 0x3}, {0x6, 0x2}, {0x7}]}, @NL80211_TXRATE_LEGACY={0x8, 0x1, [0x12, 0x1, 0x2, 0x2]}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x30, 0x36, 0xb, 0x2, 0x1b, 0x36, 0x1b, 0x30, 0x1, 0xb, 0x6c, 0x18, 0x0, 0xc, 0xb, 0x9, 0x2, 0x16, 0x6c, 0x0, 0x18, 0x36, 0x18, 0x18, 0x36, 0x6, 0x9, 0xb, 0x16, 0x12, 0x36, 0x6]}]}, @NL80211_BAND_2GHZ={0x48, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x19, 0x1, [0x48, 0x1b, 0x48, 0x9, 0x36, 0x12, 0x1, 0x12, 0x12, 0x24, 0x1, 0x30, 0x16, 0x9, 0x16, 0x3, 0x9, 0x16, 0x21, 0x1, 0x60]}, @NL80211_TXRATE_HT={0x13, 0x2, [{0x0, 0x9}, {0x5, 0x1}, {0x0, 0x4}, {0x5, 0x5}, {0x7, 0x2}, {0x0, 0x3}, {0x5, 0x6}, {0x4, 0x7}, {0x1, 0x17}, {0x0, 0x2}, {0x4, 0x1}, {0x4, 0x2}, {0x1, 0x1}, {0x6, 0x4}, {0x2, 0x2}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x964e, 0x398a, 0x8, 0xcc7, 0x0, 0x80]}}]}]}, @NL80211_ATTR_TX_RATES={0xb4, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x58, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0x1, 0x4, 0x1, 0x1, 0x7, 0x5, 0x5]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x100, 0xde0, 0x7, 0xfaf, 0x80, 0x6, 0xe3]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x0, 0xff66, 0x2, 0xffff, 0xdb, 0x3f, 0x7]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_6GHZ={0x30, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x22, 0x1, [0x48, 0x2, 0x1b, 0x60, 0x30, 0xb, 0xb, 0x7, 0x6c, 0x48, 0x36, 0xc, 0x18, 0x9, 0x6, 0x6c, 0xc, 0x30, 0xb, 0x24, 0x18, 0x36, 0x4, 0x1, 0x5, 0x6c, 0x60, 0xb, 0x2, 0x1]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0x28, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x23, 0x2, [{0x1, 0xa}, {0x1, 0x1}, {0x4, 0x5}, {0x7, 0x9}, {0x1, 0x5}, {0x7, 0x1}, {0x1, 0x3}, {0x6, 0x4}, {0x1, 0x3}, {0x1, 0x1}, {0x4, 0x6}, {0x4, 0x6}, {0x2, 0x7}, {0x6, 0x7}, {0x3, 0x7}, {0x0, 0x1}, {0x5, 0x9}, {0x1}, {0x5, 0x8}, {0x2, 0x7}, {0x1, 0x9}, {0x0, 0x1}, {0x0, 0x9}, {0x1, 0x7}, {0x4, 0x6}, {0x7, 0x8}, {0x6, 0x3}, {0x1, 0x6}, {0x6, 0x2}, {}, {0x4, 0x1}]}]}]}, @NL80211_ATTR_TX_RATES={0x238, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x18, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x2, 0x4, 0x0, 0x5a0, 0x6, 0x8, 0x2]}}]}, @NL80211_BAND_60GHZ={0x44, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1a, 0x1, [0x6, 0x16, 0x22, 0x12, 0x12, 0x18, 0x20, 0x6, 0x0, 0x5, 0xaaac29dc8520210e, 0x0, 0x5, 0x9, 0x3, 0x6, 0x6, 0x6, 0x18, 0x12, 0x0, 0x11]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x17bfa02dbee5dc1e}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x708, 0x101, 0x6, 0x7, 0x4, 0x40]}}]}, @NL80211_BAND_60GHZ={0xd4, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x30, 0x60, 0x6, 0x3, 0x60, 0x6, 0x12, 0x24, 0x1, 0xb, 0x6c, 0x6c, 0x3, 0x1e, 0x6, 0x1, 0x1b, 0x1, 0x30, 0x5, 0x2]}, @NL80211_TXRATE_HT={0x25, 0x2, [{0x0, 0xa}, {0x0, 0x6}, {0x7, 0x1}, {0x0, 0x4}, {0x3, 0x6}, {0x7, 0x8}, {0x0, 0x4}, {0x5, 0x5}, {0x0, 0x5}, {0x6, 0x2}, {0x6, 0x2}, {0x2, 0x7}, {0x4, 0xa}, {0x4, 0x4}, {}, {0x0, 0x7}, {0x0, 0x8}, {0x1, 0x6}, {0x7, 0xa}, {0x5, 0x9}, {0x2, 0xa}, {0x3, 0x6}, {0x6, 0x3}, {0x7, 0x6}, {0x6, 0x4}, {}, {0x7, 0x2}, {0x2, 0xa}, {0x6, 0x8}, {0x6, 0x1}, {0x4, 0x7}, {0x3, 0x5}, {0x3, 0x5}]}, @NL80211_TXRATE_HT={0x44, 0x2, [{0x4, 0x2}, {0x5, 0x9}, {0x6, 0x8}, {0x0, 0x6}, {0x5}, {0x6, 0x6}, {}, {0x1, 0x1}, {0x5, 0x7}, {0x7, 0x5}, {0x0, 0x8}, {0x2, 0x3}, {0x0, 0x5}, {0x3, 0x1}, {0x0, 0x9}, {0x6, 0x9}, {0x4, 0x9}, {0x6, 0x6}, {0x6, 0x3}, {0x3, 0x9}, {0x5, 0x7}, {0x0, 0x3}, {0x4, 0x5}, {0x5, 0x7}, {0x3, 0x2}, {0x7, 0x5}, {0x5, 0x8}, {0x5, 0x5}, {0x7, 0x7}, {0x4, 0x1}, {0x1, 0x2}, {0x0, 0x5}, {0x1, 0x9}, {0x4, 0x3}, {0x7, 0x8}, {0x3}, {0x4, 0x1}, {0x2, 0x5}, {0x6, 0x5}, {0x4, 0x3}, {0x7, 0x3}, {0x2, 0x3}, {0x2, 0x7}, {0x0, 0x8}, {0x4, 0xa}, {0x7, 0xa}, {0x0, 0x3}, {0x0, 0x1}, {0x3, 0x3}, {0x4, 0x1}, {0x6, 0x3}, {0x0, 0x4}, {0x0, 0x4}, {0x7, 0x2}, {0x4, 0x7}, {0x5, 0x8}, {0x7, 0x7}, {0x6, 0x2}, {0x2}, {0x5, 0x1}, {0x3}, {0x4, 0x2}, {0x1, 0x9}, {0x0, 0xa}]}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x1, 0xc, 0x18, 0x48, 0x9, 0xc, 0x6c, 0x18, 0x12, 0x12, 0x48, 0xb, 0x18, 0x60, 0x1, 0x48]}, @NL80211_TXRATE_HT={0x2a, 0x2, [{0x7, 0x7}, {0x3, 0x5}, {0x4, 0x9}, {0x0, 0x3}, {0x5, 0x6}, {0x0, 0x4}, {0x6, 0x9}, {0x2, 0xa}, {0x4, 0x9}, {0x0, 0x9}, {0x2, 0x4}, {0x4, 0x2}, {0x4, 0x4}, {0x2, 0x2}, {0x5, 0x3}, {0x4}, {0x7, 0x8}, {0x3, 0x1}, {0x4, 0x2}, {0x4, 0x5}, {0x7, 0x7}, {0x2, 0x6}, {0x0, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x2, 0x4}, {0x5, 0x8}, {0x0, 0x8}, {0x0, 0x3}, {0x4, 0x3}, {0x3, 0x5}, {0x1, 0x1}, {0x2, 0x2}, {0x2, 0x8}, {}, {0x3, 0x1}, {0x3, 0x3}, {0x1, 0xa}]}]}, @NL80211_BAND_5GHZ={0x18, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x12, 0x1, [0x12, 0x1, 0x58, 0xc, 0x72, 0x60, 0x60, 0x3, 0x30, 0x6, 0xb, 0x1d, 0x1, 0x18]}]}, @NL80211_BAND_60GHZ={0x3c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x4, 0x3, 0x7, 0x100, 0x8, 0x7, 0x35f]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x8, 0x3f, 0x8, 0x2, 0x80, 0x49, 0x9]}}, @NL80211_TXRATE_LEGACY={0x8, 0x1, [0x2, 0x9, 0x60, 0x4]}]}, @NL80211_BAND_60GHZ={0x18, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x14, 0x1, [0xc, 0x36, 0x30, 0x4, 0x16, 0x48, 0x36, 0x30, 0x5, 0xb, 0x47, 0x2, 0x18, 0x6, 0x67, 0xc]}]}, @NL80211_BAND_6GHZ={0x8c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x6, 0x9, 0x0, 0x3, 0x7fff, 0x0, 0x3]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x400, 0x1, 0xfff8, 0x8001, 0x1000, 0x4, 0x7, 0xebc]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x5f4f, 0x0, 0x0, 0x2, 0x8, 0xff, 0x4]}}, @NL80211_TXRATE_HT={0x4a, 0x2, [{0x0, 0x7}, {0x1, 0x6}, {0x0, 0x8}, {0x6, 0x3}, {0x3, 0x6}, {0x1, 0x8}, {0x1, 0x9}, {0x1, 0x1}, {0x1}, {0x1, 0x6}, {0x5, 0x9}, {0x5, 0xa}, {0x0, 0x4}, {0x7, 0x9}, {0x1, 0xa}, {0x1, 0x1}, {0x4, 0x3}, {0x5, 0x5}, {0x1, 0x3}, {0x2, 0xa}, {0x1}, {0x3, 0x6}, {0x3, 0x7}, {0x0, 0x7}, {0x1, 0x5}, {0x5}, {0x2, 0x4}, {0x7}, {0x0, 0x4}, {0x7, 0xa}, {0x3, 0x6}, {0x0, 0x1}, {0x6, 0x2}, {0x1, 0x9}, {0x4, 0x5}, {0x2, 0x9}, {0x3, 0x9}, {0x2, 0x9}, {0x2, 0x9}, {0x1, 0x6}, {0x7, 0x9}, {0x4, 0x6}, {0x5, 0x1}, {0x5, 0x6}, {0x0, 0x3}, {0x4}, {0x3, 0x5}, {0x1, 0x9}, {0x5}, {0x7, 0x1}, {0x2}, {0x2, 0x2}, {0x0, 0x2}, {0x3, 0x2}, {0x6, 0x8}, {0x4, 0x6}, {0x1}, {0x1, 0x6}, {0x0, 0xa}, {0x7, 0x7}, {0x1, 0x6}, {0x4, 0x6}, {0x1}, {0x3, 0x3}, {0x4, 0x1}, {0x0, 0x9}, {0x5, 0x8}, {0x6, 0x5}, {0x4, 0x8}, {0x5, 0x8}]}]}, @NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}]}]}]}, 0xa6c}, 0x1, 0x0, 0x0, 0x810}, 0xc0) [ 590.209344] F2FS-fs (loop3): Invalid log sectors per block(99) log sectorsize(9) [ 590.216944] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 590.227651] F2FS-fs (loop3): Unable to read 2th superblock [ 590.234464] F2FS-fs (loop3): Invalid log sectors per block(99) log sectorsize(9) 12:29:23 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 590.332130] BTRFS error (device loop5): superblock checksum mismatch [ 590.346965] BTRFS error (device loop5): open_ctree failed [ 590.376847] BTRFS error (device loop5): superblock checksum mismatch 12:29:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12a, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, 0x0, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x11000202}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xd8, r1, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4}, 0x4008000) getsockname$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{}, [@bcast, @null, @remote, @default, @rose, @default, @bcast, @bcast]}, &(0x7f0000000000)=0x48) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x17, 0x0, 0x81}) 12:29:23 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 590.519903] BTRFS error (device loop5): open_ctree failed [ 590.628258] BTRFS error (device loop5): superblock checksum mismatch [ 590.645913] BTRFS error (device loop5): open_ctree failed 12:29:23 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = accept$netrom(r1, 0x0, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000040)={{0x2, 0x9}, 'port0\x00', 0x11, 0x80c01, 0x7, 0x7, 0x47c2, 0xfffffe01, 0x0, 0x0, 0x4, 0x40}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r7) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:23 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900007fff0000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:23 executing program 0 (fault-call:6 fault-nth:0): r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:23 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:23 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:23 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x2) 12:29:23 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x3f00) 12:29:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:23 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x4000) 12:29:24 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x100000, 0x0) 12:29:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 12:29:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:24 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000020000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:24 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x1000000) 12:29:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:24 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x2000000) 12:29:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:24 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x3f000000) 12:29:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000505000000000000400000000000000001010000000000004000000000000000060500000000000040000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000", 0x273, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:24 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000040000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 12:29:25 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x4240a2a0) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) splice(r7, 0x0, r6, 0x0, 0x5f5, 0x2) 12:29:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:25 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x40000000) 12:29:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 12:29:25 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000070000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 592.528411] BTRFS info (device loop5): disk space caching is enabled 12:29:25 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0xfeffffff) [ 592.571248] BTRFS info (device loop5): has skinny extents 12:29:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:25 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000090000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:25 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0xfffffffe) 12:29:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 592.796914] attempt to access beyond end of device [ 592.812663] loop5: rw=4096, want=2064, limit=267 [ 592.817619] BTRFS error (device loop5): failed to read chunk root [ 592.890164] BTRFS error (device loop5): open_ctree failed 12:29:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:26 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000000a0000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:26 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x100000000000000) 12:29:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 12:29:26 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) io_setup(0x9, &(0x7f0000000240)=0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000180)={'tunl0\x00'}) io_submit(r6, 0x2000000000000072, &(0x7f0000000080)) syz_mount_image$v7(&(0x7f00000001c0)='v7\x00', &(0x7f0000000200)='./file0\x00', 0x9, 0x6, &(0x7f0000000640)=[{&(0x7f0000000280)="01157a2d689e4d0e3c2bdd1bc529d1320b9705f77fceaadd447a9c435c28d5e4f72d6f8f59378758e9ab5fb52ff7a3700483d977566f64b1550b7689e55eeeff154049d968378e39faef4f2db4", 0x4d, 0x9}, {&(0x7f0000000400)="67670046621798e62a8e0c11eca8a9c8595f141bc579abc834edb91ce228077559202de64dd202ad9c1eb935777ff1f850661c83e695c7c2f1c67266a0453d765cddc0967da668f79c08d5855f7219ce157a121801bfd641c1b54e98be525112abf153938dd54125c8a6daabc7574d55f6bef3f6b405e0779cd381838683ced990a6160a990df8981b426119e1e6a37c5ba48ac75812dc224f480c1976458c5ae0c7eccb5c1b9664b222e0026b1d91936e3ced4af5ba857929e09f5bdfb943bab4b8bac4e20b5b", 0xc7, 0x83}, {&(0x7f0000000300)="25d40263a3b839ba4da4c3fe7f7a25e66e51ee26fdd7c39fda72e081badc093c8b19ed6895c79f0389a56042a782fb4d6bee560089100638aa52c7113fbe80f62584f86814eef6f639e7b24295e6c8b7d828855fe55be9887f25f66d7409356a97fcfbccc37f15", 0x67, 0x1}, {&(0x7f0000000500)="44a4b408c831d0709e28fd8098f76dd4b6cd241bd51a576bf26180f9a7ec96310975b39869f200cf35f647be0debf223824a07643bf90912b6c2b3e9e21f2f519da7e69f75fad5df839f3a5cdbc3c77bd2e762fc955565c6d1daa4936651deee855f9cdb0c2f8c944af3e6a43f92a6d71ec27ff0343b229b76fa3fd717bf0c31498a3032b51a22772f11f5f21b207f1478e50876f03dbe3b9eca46d65a1e817d3f67b5e01ba1d98ba6aad5c29359ecd25c94127cffd15a5bd10779ecae1aa67a93854da9bbb2ddf96c514e8ef3625822af63ecb9fd932b672bcb627b84d3a845b600c5d0623ce3b032", 0xe9}, {&(0x7f0000000380)="7621ef5f80", 0x5, 0x1}, {&(0x7f0000000600)="96fbf14d818bd9fbae51d73909faab72570dc83dc3addb4241c320209d52a93cdda982", 0x23, 0x800}], 0x420802, &(0x7f00000007c0)=ANY=[@ANYBLOB="2c212c2f6465762f627367002c2f6465762f627367002c62617461647630002c736d61636b66737472616e736d7574653d2f6465762f627367002c736d61636b66736465664a2f6465762f627367002c009212fbcebe6de37a19c5c4f8bc9bd9aef40dee63d60ba9343cfee5f8eac9b3d383c21164c03fa01a83df1759863f482328691f03eecce47676"]) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x80002, 0x0) io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0xfffd, r7, &(0x7f0000000740)="9e1611d2975ce583efe0e7ce761f05fd579c596530f9f4b94aa67684e1808e213c44838a465991a9b606df2a7ebfc3bf074143f44e19886cee3f5a2dc3e20b7823f0c40c9ebb1f7f67a4c53c3717c354f6858c61d836250f6d4f573e", 0x5c, 0x4, 0x0, 0x3}, &(0x7f0000000000)) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r8, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) [ 593.427907] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:29:26 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x200000000000000) [ 593.477271] BTRFS info (device loop5): disk space caching is enabled [ 593.508175] BTRFS info (device loop5): has skinny extents 12:29:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:26 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x3f00000000000000) [ 593.588240] attempt to access beyond end of device [ 593.593397] loop5: rw=4096, want=2064, limit=267 [ 593.598537] BTRFS error (device loop5): failed to read chunk root [ 593.616417] BTRFS error (device loop5): open_ctree failed 12:29:26 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000000f0000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 593.656270] BTRFS info (device loop5): disk space caching is enabled [ 593.670287] BTRFS info (device loop5): has skinny extents 12:29:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:26 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x4000000000000000) [ 593.757873] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:29:26 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0xfeffffff00000000) [ 593.800198] attempt to access beyond end of device [ 593.805366] loop5: rw=4096, want=2064, limit=267 [ 593.814066] BTRFS error (device loop5): failed to read chunk root 12:29:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:26 executing program 0: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xffff}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc02}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x10}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x240000c4}, 0x8080) r0 = socket$kcm(0x2, 0x2, 0x73) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000240)=0x1, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000200)={r0, 0x8, 0xb2c, 0x200}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000000)=0x83b, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 593.879727] BTRFS error (device loop5): open_ctree failed [ 593.969480] BTRFS info (device loop5): disk space caching is enabled [ 593.976403] BTRFS info (device loop5): has skinny extents 12:29:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 594.017109] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 594.052925] attempt to access beyond end of device [ 594.078790] loop5: rw=4096, want=2064, limit=267 [ 594.093815] BTRFS error (device loop5): failed to read chunk root [ 594.121711] BTRFS error (device loop5): open_ctree failed 12:29:27 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000000)) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000040)=""/17) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:27 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x129101, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) 12:29:27 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000100000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {0x0, 0x0, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 594.403220] BTRFS info (device loop5): enabling free space tree [ 594.415990] BTRFS info (device loop5): using free space tree [ 594.435837] BTRFS info (device loop5): has skinny extents [ 594.435995] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:29:27 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) r4 = dup3(r2, r0, 0x80000) ioctl$SNDCTL_SEQ_OUTOFBAND(r4, 0x40085112, &(0x7f0000000000)=@s={0x5, @SEQ_MIDIPUTC=0x80, 0x20, 0x80}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x2400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) 12:29:27 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000140000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {0x0, 0x0, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:27 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 594.638261] attempt to access beyond end of device [ 594.647097] loop5: rw=4096, want=2064, limit=267 [ 594.654935] BTRFS error (device loop5): failed to read chunk root 12:29:27 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000300000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 594.690183] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 594.719773] BTRFS error (device loop5): open_ctree failed [ 594.737536] BTRFS info (device loop5): disk space caching is enabled 12:29:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 594.809569] BTRFS info (device loop5): has skinny extents [ 594.928404] attempt to access beyond end of device [ 594.958392] loop5: rw=4096, want=2064, limit=267 [ 594.974713] BTRFS error (device loop5): failed to read chunk root [ 595.021619] BTRFS error (device loop5): open_ctree failed 12:29:28 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x5, 0x81, 0x80, 0x40, 0x0, 0x8, 0x43110, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x4, 0xe77}, 0x4ae8a, 0x10001, 0x37, 0x5, 0x8, 0xfffffffb, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x2) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080)='wireguard\x00') 12:29:28 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = memfd_create(&(0x7f0000000000)='.\x00', 0x3) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) dup3(r0, r3, 0x0) 12:29:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {0x0, 0x0, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:28 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000003e0000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) [ 595.280536] BTRFS info (device loop5): disk space caching is enabled [ 595.292647] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 595.299249] BTRFS info (device loop5): has skinny extents 12:29:28 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f00000001c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2={0xfc, 0x2, [], 0x1}, @private2, 0x9, 0x800, 0x9, 0x800, 0x0, 0x100008}) r4 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x8001}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x4004803) dup3(r0, r5, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0x4, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@multicast1, 0x4e21, 0x81, 0x4e20, 0x7, 0xa, 0x20, 0x20, 0x2f, r8, 0xee00}, {0x209, 0x5, 0x1000, 0x2, 0x0, 0x7f, 0xfff, 0x7}, {0x200, 0x1, 0xfe, 0x2}, 0x6, 0x6e6bbc, 0x2, 0x1, 0x2, 0x3}, {{@in=@rand_addr=0x64010101, 0x4d5, 0x2b}, 0x2, @in6=@private0={0xfc, 0x0, [], 0x1}, 0x3500, 0x3, 0x2, 0x1f, 0x2, 0x5}}, 0xe8) [ 595.331088] f2fs_msg: 123 callbacks suppressed [ 595.331102] F2FS-fs (loop3): Invalid log sectors per block(62) log sectorsize(9) [ 595.369782] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 595.377523] F2FS-fs (loop3): Unable to read 2th superblock [ 595.384452] F2FS-fs (loop3): Invalid log sectors per block(62) log sectorsize(9) [ 595.397543] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 595.405628] F2FS-fs (loop3): Unable to read 2th superblock 12:29:28 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$rfkill(0xffffffffffffffff, 0x0, 0xff02160) dup3(r0, 0xffffffffffffffff, 0x0) [ 595.482999] F2FS-fs (loop3): Invalid log sectors per block(62) log sectorsize(9) [ 595.504509] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 595.517960] F2FS-fs (loop3): Unable to read 2th superblock [ 595.518314] attempt to access beyond end of device 12:29:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400), 0x0, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:28 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000004d0000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 595.524610] F2FS-fs (loop3): Invalid log sectors per block(62) log sectorsize(9) [ 595.567475] loop5: rw=4096, want=2064, limit=267 [ 595.582006] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 595.602178] BTRFS error (device loop5): failed to read chunk root 12:29:28 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r1, 0x0, 0xff02160) dup3(r0, r1, 0x0) [ 595.640299] BTRFS error (device loop5): open_ctree failed [ 595.651368] BTRFS info (device loop5): enabling free space tree [ 595.665209] BTRFS info (device loop5): using free space tree [ 595.675772] BTRFS info (device loop5): has skinny extents 12:29:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 595.815932] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 595.882768] attempt to access beyond end of device [ 595.890459] loop5: rw=4096, want=2064, limit=267 [ 595.904628] BTRFS error (device loop5): failed to read chunk root [ 595.942717] BTRFS error (device loop5): open_ctree failed 12:29:28 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000000)={0x4}, 0x4) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 12:29:28 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x5, &(0x7f0000000380)=[{&(0x7f00000000c0)="445eb576855d42e910a5eba6e494e3ace5c5ba32b540681781e3c81e3583c8cf9989cffff330cbf5f55679cee023d3d0a94bb8401eac58dd3e8cdc0bf133971daf68f014156e0a1b1c7e42e67d33711e03e5a99066f8b7e8a8dc98bf5423c51a", 0x60, 0xffff}, {&(0x7f00000001c0)="c54279e9db1fdab87bec8e334e87a9b4d0cba037b401ee70fe5fbf0c151ba305e9f86c2dcf21e2603717c1b1549f6d6259ba609f1127966336376a9d7a5cc58470d9f07d852fe69b1d21700dfa125af73da065e7e63a0e2abb", 0x59, 0x4}, {&(0x7f0000000240)="127744935d7c68ade6b3d875d8852275977c0c8173cd663a6824c23044060a2a26dc0748386a0b24b42438bdb7d3e8e53da4133685ced5778754622c71d422be4b3f5348569e79769fadd28ed8ddaf7f3e03de9856ac60929b890079fc9cb6bbf5d197aa69197f4c130776c532932a57d8ceb7195e399120afb1219ba0366557f5100d5df37e70a311055ec51b09f2061becfbf1d2aef99104d9e130cd4274926fd102a0419b1c68db29d10ffb83d231eecc6bf083f3420f7953ca20295e65b67ff4ffbeb365084cec81234eeb53d8262c254ad2c48c5e61ef05df6be237db544fb046", 0xe3}, {&(0x7f0000000140)="b8d040d17db92e875cb9f76e3cc89ba83aef79b40d8954", 0x17, 0x5}, {&(0x7f0000000340)="716f9f6edae64fd256ad98de34e4f53798caae0e081f196da0857cbee14f89f441c006ac995706224f979c52", 0x2c, 0x40}], 0x800080, &(0x7f0000000400)={[{@show_sys_files_yes='show_sys_files=yes'}, {@nls={'nls', 0x3d, 'cp1250'}}, {@fmask={'fmask'}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@show_sys_files_yes='show_sys_files=yes'}], [{@appraise='appraise'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/dsp\x00'}}, {@audit='audit'}]}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:28 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000530000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:29:29 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x602580, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) dup3(r0, r4, 0x0) 12:29:29 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000630000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 596.264075] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 596.282424] BTRFS info (device loop5): enabling free space tree [ 596.314756] BTRFS info (device loop5): using free space tree [ 596.340386] BTRFS info (device loop5): has skinny extents 12:29:29 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) r5 = dup3(r0, r4, 0x0) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f00000000c0)={0x7ff, "fb4e8f4d637ab93421afdc6ee7645321846bd80c995cd7d53cb2609670f76472", 0x3, 0x8, 0x5, 0x3000000, 0xa00, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r8, 0x80605414, &(0x7f0000000000)) 12:29:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010400)}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:29 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000d00300000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 596.542344] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:29:29 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) r5 = dup2(r1, 0xffffffffffffffff) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r8, 0x3, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(r5, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x84, r8, 0x20, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0xffff8001, 0x1f}}}}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY={0xc, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}]}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x2}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "89c9fd89d5fc77cfbb5c8ddc9f"}, @NL80211_ATTR_KEY_SEQ={0x12, 0xa, "ee1a152a0ad3ed7c419b05482243"}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) dup3(r0, r4, 0x0) [ 596.602145] attempt to access beyond end of device [ 596.607401] loop5: rw=4096, want=2064, limit=267 [ 596.636448] BTRFS error (device loop5): failed to read chunk root [ 596.683994] BTRFS error (device loop5): open_ctree failed [ 596.702738] BTRFS info (device loop5): disk space caching is enabled [ 596.713959] BTRFS info (device loop5): has skinny extents [ 596.827199] attempt to access beyond end of device [ 596.832539] loop5: rw=4096, want=2064, limit=267 [ 596.837571] BTRFS error (device loop5): failed to read chunk root [ 596.894446] BTRFS error (device loop5): open_ctree failed 12:29:29 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r6, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0xe, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000080}, 0x20044044) r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/time_for_children\x00') write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[@ANYBLOB="d7ae646e9ae35c1b66e015c0fdd45bd569be03094a70b988aa257e8f0e9c2a83917b18ccfe8fc94c56e9598f086ec2b953bf5cd42446aeb0030fce15870aa3f04622aba3454a836af5964150e26bd6b0a0627cee25ceebc09cf919b5301cf8688e5cbe26097c22111841ddeb640794aee66e9b2334d2a0083238cd3721136042436b62b550d3da69d3f35f1154403ad0e3a2300204795da0007d64c05a663cb45235892b8f70345dec0fd84b1f33285d8d"], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x100000, 0x0) 12:29:29 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003000000080000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010400)}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:29 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r3, &(0x7f0000000000)="9e61892c83f6cd9815a8f9", &(0x7f00000001c0)=""/4096, 0x4}, 0x20) 12:29:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:29:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:29 executing program 0: socket$kcm(0x2, 0x2, 0x73) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x9c, 0x0, 0x200, 0x70bd29, 0x25dfdbfa, {}, [@IPVS_CMD_ATTR_DAEMON={0x88, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_batadv\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x27}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xf}}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4048000}, 0x11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) r4 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) dup3(r4, r3, 0x0) [ 597.092712] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 597.094342] BTRFS error (device loop1): superblock checksum mismatch 12:29:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:29:30 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x40000, 0x0) read$rfkill(r4, 0x0, 0xff02160) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) dup3(r0, r4, 0x0) 12:29:30 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030200000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 597.219147] BTRFS error (device loop1): open_ctree failed [ 597.256120] BTRFS error (device loop1): superblock checksum mismatch 12:29:30 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000000c0)="8da561e766a351271eb7f994d5aeb94a7b8f03c07b11650a58ddb4d40eed54e83abbdd2ba99f0f6461c16bc3b20015c6727780c92d0820427058b2765c71a713d77dae92237ac26c9061da2fc04b5bcefcd115df0b91c242625771f4a1fe3bd1cb5d7fb251b235971ee3db55e649aa28dfeed135", 0x74}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="8477231613353d5bfb39171cde8adc2b99407a042d9215cf897ec2099aaa1f8cf9e14d55ba2887fb8d355233317698f6b3d7edff01d295e07620b9c9d3fab6f5fb66ea53cd03a0fcbb6db1c8906e13b6cafccb24a675dc964451bbc9a2c75ca9c2ec27001ac2d2ebb31739c360bcaad09c0dcb23ce4cb04d2c93d2f4f17e6c2446cf462fb892c6d0e2153a33c6702247bdde", 0x92}, {&(0x7f0000000140)="27888994448d", 0x6}], 0x4, &(0x7f00000013c0)=[{0x70, 0x1, 0x4, "9eafb8365a437f5978b606ade3518aded44d05e7271199148914e679da9ee893225b289905fa9ef9628bb3fa1058d55b23b356bca51b13af4c97bb3f55b41c94250d05fd1c293f1e356cf7f6f5809805ce93fce44d97d77100b9adf3fcdd10"}, {0x80, 0x114, 0x6, "30ade65c839159ad31c6bde328bc891f09161c7e5b271622143385bb9e38ff200c99f2d43a36007adf9a562a0d9f6ae387ebf192888e571f42fe4ee17e0ab6961cfcc1dc496179af83a700f10093085658b2186ba973322d1994b2c30362ecf9688e0b4b6744712c00"}, {0xc0, 0x1, 0x0, "9c67020a4290f46bb633fc33ac8ee0d99c1f70acf4bc135e7e3eda7866313bb22aec011eae9c924740f62451bdcdd8766a4e4aabebaaf3f1a41ed1c74c864aab9af249621c8e4474869ee67eb7015759b4ac659443fe2e6db9f54c3e1a6a100ac9f24d80312f3e0191e255f68d9fa26783c04f1434c8af10c370784a0e90613f7be76ae14c040cd49a24dc131a2bb1e4722f36e3893916fe6ca29be05911ca5f97a55bcd265da6be05"}, {0x60, 0x118, 0x7ff, "b3d4c614dfc01aa78fd86944a76fce99434cb7d38dbb7fcb8dc213b4dc42539fd3190666f9108e2eba330ff719a55cb3c7a0858ace2c2d48d15ce0aa8079fcb1f0232f5ce28f5ccd47be48"}, {0xd0, 0x108, 0x6, "fa0967c1cdf87c3148792afc5ac8666c28f79a96e2aedc3d1c2b19a584a4cc91f5a5753255e1270782456f6966340f9d9fe63ee5cdf2393d39fdc2256d54ad4fef6ed517a918f74b4075f6ee8335f2f2c22c4dfd3010ec7b7c48aa7e31f4dedc3c0a1d163b1731517ce1c5bfde91e11dc32e82d1a9ac0eb41fedc3ecfe095442caf001143d449105c53f2f51ec33e53338652700a58c825ac3583fb2d21bf90a9cfd6b0d0cdab86c007e817d194bda199e9a5a775f40e2df77f63850b1f0f053"}], 0x2e0}, 0xc000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x3f) read$rfkill(r4, 0x0, 0xff02160) r5 = openat$cgroup_ro(r3, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) setsockopt$inet6_buf(r5, 0x29, 0xca, &(0x7f00000001c0)="87f8c5279872e794ed8fdf81947ce8ab91cb15b67d962c25fb39ac31d68ec0b06a63b41de8e0e69e7ea46581804d349d1013517ec6639230cf650f0fecedd63b6d8ca5903753d37171de88bb2028c89a721645a447e5c039b26128102492374184e0b12687bd261b218e6699014eb69a1f5fb4c9a93a49ccd9bcda2b3576633695d90b9c9ffa311defb664dbd89dd912578feb0623c13812b7b2d8c1f70ead24cef7bd534f579100ae733a4b3f832bb31c6628a6122639f9977f3bbfb36e64a3b5e5830b6634e26c577da3deaf420cc81aa89b", 0xd3) dup3(r0, r4, 0x0) ioctl$VFIO_SET_IOMMU(r3, 0x3b66, 0x4) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x1000}, 0x4) 12:29:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010400)}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 597.366662] BTRFS error (device loop1): open_ctree failed [ 597.401026] BTRFS info (device loop5): enabling free space tree [ 597.415414] BTRFS info (device loop5): using free space tree [ 597.423020] BTRFS info (device loop5): has skinny extents [ 597.443125] attempt to access beyond end of device [ 597.448108] loop5: rw=4096, want=2064, limit=267 [ 597.467228] BTRFS error (device loop5): failed to read chunk root [ 597.483288] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 597.624078] BTRFS error (device loop5): open_ctree failed 12:29:30 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0xf503, 0x0) 12:29:30 executing program 0: ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045503, &(0x7f0000000000)={0xe, 0x1}) r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x1bd281, 0x0) ioctl$SIOCAX25CTLCON(r5, 0x89e8, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null, 0x63, 0x8001, 0x3, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) dup3(r0, r4, 0x0) 12:29:30 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:30 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030300000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:30 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0], 0x2}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) r4 = dup3(r1, r3, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) execveat(r4, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000040)='/dev/dsp\x00'], &(0x7f00000001c0)=[&(0x7f0000000100)='{+\x00', &(0x7f0000000140)='\'#\x00'], 0x1000) [ 597.984186] BTRFS error (device loop1): superblock checksum mismatch [ 597.997324] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 12:29:30 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x68, 0x3, 0x6, 0x500, 0x0, 0x0, {0xc, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x10) dup3(r0, r4, 0x0) 12:29:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 598.113374] BTRFS error (device loop1): open_ctree failed 12:29:30 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030400000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:30 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:31 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x6d) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, &(0x7f0000000040)=0x11, 0x4) dup3(r0, r4, 0x0) [ 598.383057] BTRFS info (device loop5): enabling free space tree [ 598.402126] BTRFS info (device loop5): using free space tree [ 598.408216] BTRFS info (device loop5): has skinny extents [ 598.434753] attempt to access beyond end of device [ 598.444029] loop5: rw=4096, want=2064, limit=267 [ 598.450864] BTRFS error (device loop5): failed to read chunk root [ 598.497561] BTRFS error (device loop5): open_ctree failed 12:29:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:31 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000040)={'batadv_slave_0\x00', {0x2, 0x0, @multicast2}}) read$rfkill(r4, 0x0, 0xff02160) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)={0x24, r8, 0xd5bf98d0fc1ca92f, 0x0, 0x0, {{}, {}, {0x8, 0x2, 0x100}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r6, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r8, 0x614, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4) dup3(r0, r4, 0x0) 12:29:31 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:31 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030500000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:31 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r8, &(0x7f00000003c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00', 0x7}, 0xfffffffffffffea0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) r9 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r9, 0x11b, 0x3, 0x0, 0x0) r10 = socket(0x23, 0x5, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x4001, 0x130) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, 0x0, 0x54) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r5, @ANYRES16=r6, @ANYRESOCT=r4, @ANYBLOB="a6b1e1deccf0e1600be3b5db8b67ea527a3c3973abbcded5b6e7866229b3abbd6fd9592c56da2e2324cadcb5dd7148b6bd9c07a0f992419c65ec45460b15cc51459bf04a9df0826a9ad9cb2a6bcd4ed206fbb32fea175a59df8031c8040e8d359da460fd780dba796a2c8a5f3b796e7d6d606e6fb58b0a1792b8b5b4e151dc3b65a2bce9b17c3562bfab23f274993558baa87dd209901185516fcafbbf3e402810ca6443293df45350097a2206aa4e46613652135450772fe632759f5847e307ccd456a8475cfbc900fc1436fbbb99d5e0cf2a50ddb3a3246df087076789816d435af9a674", @ANYRESHEX, @ANYRESHEX=r9, @ANYRES16=r3, @ANYBLOB="8e3e39d99fb1070917dee5b68f5088b2d460e0a4e83305f64fdcbded1cb831b98b318c44de5d7571eaa0f13a7a91b5cc2f36f864202dced3d71eb42755185ee4ec786dd8f20576136b03da79cc600556c5f23e0b4f273e803e3bccab8ffcab851d17665aa9db8785ab63496508415103", @ANYRESOCT=r10, @ANYRES64], 0x4240a2a0) splice(r0, 0x0, r7, 0x0, 0x6cb7, 0x8) 12:29:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:31 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_SIGNAL_MASK(r3, 0x4004ae8b, &(0x7f0000000000)={0x2d, "65218e4b8f6ca29ea0b15aa937cb628783f24092e6d6fe154e894189f662d658cb27acf089422f5a489335a9b7"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r7, 0x0, 0xff02160) dup3(r0, r7, 0x0) 12:29:31 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='wg1\x00', 0x4) r3 = dup2(r1, r2) r4 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x100000001) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000080)={0x2d, {{0xa, 0x4e23, 0xfff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x88) dup3(r0, r5, 0x0) [ 598.961306] BTRFS info (device loop5): enabling free space tree [ 598.969612] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 598.987843] BTRFS info (device loop5): using free space tree [ 599.002820] BTRFS info (device loop5): has skinny extents 12:29:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:31 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030600000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 599.183439] attempt to access beyond end of device [ 599.204557] loop5: rw=4096, want=2064, limit=267 12:29:32 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000000)={0x6e, 0x4, 0x8, 0x0, 0xb12}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 599.226107] BTRFS error (device loop5): failed to read chunk root 12:29:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 599.289514] BTRFS error (device loop5): open_ctree failed [ 599.309837] BTRFS error (device loop1): superblock checksum mismatch 12:29:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 599.346713] BTRFS error (device loop1): open_ctree failed 12:29:32 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$KDMKTONE(r3, 0x4b30, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffff7fb5, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x9, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x7, 0x2f, 0x401}, &(0x7f0000000140)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x101}}, 0x10) r5 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x100, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7b, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000340)={r8, 0x1000}, &(0x7f0000000380)=0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:32 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030700000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 599.555344] BTRFS info (device loop5): enabling free space tree [ 599.567889] BTRFS info (device loop5): using free space tree [ 599.588718] BTRFS info (device loop5): has skinny extents 12:29:32 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = gettid() tkill(r7, 0x40) recvfrom$ax25(r0, &(0x7f0000000080)=""/72, 0x48, 0x86b5dd1597d7f102, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@default, @bcast, @bcast, @bcast, @null, @bcast, @default, @bcast]}, 0x48) r8 = getpgrp(0xffffffffffffffff) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x87) tgkill(r7, r8, 0x13) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='geneve0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f00000001c0)={0xc2c, 0x2a9, 0x101}) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010400)}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)) 12:29:32 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) r5 = syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x3, &(0x7f00000002c0)=[{&(0x7f00000000c0)="95983b2f80ef13363a15e59c3eb215759776eee32efa28fd666aa031e9f147cc64dd3f90fd5f", 0x26, 0x81}, {&(0x7f00000001c0)="650fd68f83f2b0c81bcb5337188bbfd252ebc6bb66951e3822d1ffdb4069a6190f6a49ad26555f864c6db3d491c9b6761bb332ae894cb95da2b8768d6b4d9bdd8ea8c58ad3b77280b7042c748956821a13ba27b66124c7280b46e825f78be51d1a6ba555f711dcf3249bfbe41eb9c5a12a8e013c767271879de1c58d038aba303b67beb6c78679704bf95f73acff5617b29a72f0b8b6a8381b92776593d9f60c6bb79f550358546099833e5f3c012a212cfe7c4be6a9ad390d392606a1ffbd7081c6f6ee5074", 0xc6, 0x80000000}, {&(0x7f0000000100)="3bd1ac85003c4cac9582d38f3196abb86bccef79132d6ea6da397457290e41314f418ecf73423755f504ddb7145e143792ec2fe618474f9a2da577b93242e2375cc6be4cb3d5b4c0697622f04278cf9e1870752f341768340b55fa4ff4674d9c372a26ad", 0x64, 0x8a0a}], 0x800000, &(0x7f0000000340)={[{'/dev/dsp\x00'}, {'@/'}], [{@obj_user={'obj_user', 0x3d, '/dev/dsp\x00'}}, {@hash='hash'}, {@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/dsp\x00'}}, {@context={'context', 0x3d, 'user_u'}}, {@measure='measure'}]}) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r5, 0xf503, 0x0) 12:29:32 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030900000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 599.637258] attempt to access beyond end of device [ 599.643537] loop5: rw=4096, want=2064, limit=267 [ 599.649834] BTRFS error (device loop5): failed to read chunk root [ 599.709677] BTRFS error (device loop5): open_ctree failed 12:29:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)) 12:29:32 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) r7 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r7, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) [ 599.785934] BTRFS error (device loop1): superblock checksum mismatch 12:29:32 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000240)={0x80, 0x800, 0xfffa, 0x400}, 0x8) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0xbb39, 0x6}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r6, 0x84, 0x78, &(0x7f0000000300)=r7, 0x4) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r10, @ANYBLOB="030000000000000000007300000001000300", @ANYRES32=r11, @ANYBLOB], 0x1c}}, 0x0) link(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') sendmsg$NL80211_CMD_TDLS_MGMT(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r5, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x89}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_IE={0xc, 0x2a, [@cf={0x4, 0x6, {0xb2, 0x9, 0x33c, 0x5}}]}]}, 0x34}, 0x1, 0x0, 0x0, 0xc001}, 0x20000844) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 599.867507] BTRFS error (device loop1): open_ctree failed 12:29:32 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030a00000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)) [ 599.961193] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 599.987295] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:29:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010400)}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:32 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030c00000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 600.034809] BTRFS info (device loop5): enabling free space tree [ 600.060480] BTRFS info (device loop5): using free space tree 12:29:32 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$vim2m_VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000000)={0x5, 0x6}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 600.111006] BTRFS info (device loop5): has skinny extents 12:29:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000880)) 12:29:33 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 600.234380] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:29:33 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000031000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 600.322426] attempt to access beyond end of device [ 600.327654] loop5: rw=4096, want=2064, limit=267 [ 600.355953] BTRFS error (device loop5): failed to read chunk root [ 600.408497] BTRFS error (device loop5): open_ctree failed 12:29:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:33 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) r5 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r5, 0x5000943f, &(0x7f00000001c0)={{r6}, r7, 0xdbdb2609e5a47ae2, @inherit={0x88, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x5, {0xf913575377d54514, 0x1, 0x5, 0xa22c0000000000, 0xb5cb}, [0x2, 0x101, 0x1, 0x2c7, 0xfffffffffffffffd, 0x5, 0xdd7, 0xefd]}}, @name="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"}) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 600.501894] f2fs_msg: 146 callbacks suppressed [ 600.501910] F2FS-fs (loop3): Invalid log sectors per block(4099) log sectorsize(9) [ 600.531656] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 600.553216] F2FS-fs (loop3): Unable to read 2th superblock [ 600.570181] F2FS-fs (loop3): Invalid log sectors per block(4099) log sectorsize(9) [ 600.595124] BTRFS info (device loop5): enabling free space tree [ 600.603294] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 600.618091] BTRFS info (device loop5): using free space tree [ 600.635009] F2FS-fs (loop3): Unable to read 2th superblock [ 600.655711] BTRFS info (device loop5): has skinny extents [ 600.694551] F2FS-fs (loop3): Invalid log sectors per block(4099) log sectorsize(9) 12:29:33 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000000)={0xffff, "56cf114d722ad7d21533ffe9ddc0008f2b5805ec7cd2354d65f33be68608cc37", 0x2}) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000880)) 12:29:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:33 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r4, 0xc0045006, &(0x7f0000000040)=0x3) r5 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = dup2(r1, r5) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0xf) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)={{0x10b, 0x81, 0x3f, 0x2d7, 0x100, 0xebb, 0x83, 0x400}, "2c6639148645ab7127f6734266f382342e6450866ca35c74a06176fcd467c4b79ede14e2c7c63faebe1f5e80ead4dc2b07f6dbc6bb45cc2df15740dada2a7d1f4c06caee5c714d4d51c7db4fe8a72bb74fe2c8c9994c47227b1395", [[], [], [], [], [], [], [], [], []]}, 0x97b) read$rfkill(r7, 0x0, 0xff02160) dup3(r0, r7, 0x0) [ 600.711094] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 600.725815] F2FS-fs (loop3): Unable to read 2th superblock [ 600.743798] F2FS-fs (loop3): Invalid log sectors per block(4099) log sectorsize(9) 12:29:33 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000032200000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 600.817670] attempt to access beyond end of device [ 600.842914] loop5: rw=4096, want=2064, limit=267 12:29:33 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) dup3(r0, r4, 0x0) [ 600.866671] BTRFS error (device loop5): failed to read chunk root [ 600.876331] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:29:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 600.939316] BTRFS error (device loop5): open_ctree failed 12:29:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000880)) 12:29:33 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x248141, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r7, 0x3, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r7, 0x400, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x7fff, 0x74}}}}, [@NL80211_ATTR_TSID={0x5}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xd}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x6}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xe}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xe}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x8014) read$rfkill(r3, 0x0, 0xff02160) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r9, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, 0x2, 0x8, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c805}, 0x4000000) dup3(r0, r3, 0x0) 12:29:33 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000032300000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 601.315059] BTRFS info (device loop5): enabling free space tree [ 601.325783] BTRFS info (device loop5): using free space tree [ 601.346888] BTRFS info (device loop5): has skinny extents [ 601.398950] attempt to access beyond end of device [ 601.404079] loop5: rw=4096, want=2064, limit=267 [ 601.425115] BTRFS error (device loop5): failed to read chunk root [ 601.450706] BTRFS error (device loop5): open_ctree failed 12:29:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:34 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:34 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000032c00000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:34 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) accept4$ax25(r7, &(0x7f0000000000)={{0x3, @null}, [@default, @bcast, @null, @remote, @remote, @null, @rose, @netrom]}, &(0x7f0000000080)=0x48, 0x80800) 12:29:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:34 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) dup3(r0, r3, 0x0) 12:29:34 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) r5 = openat$cgroup_ro(r3, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r5, 0xc02c564a, &(0x7f0000000040)={0x0, 0x32315659, 0x2, @discrete={0x7, 0x10001}}) dup3(r0, r4, 0x0) 12:29:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000880)) [ 601.795022] BTRFS info (device loop5): enabling free space tree [ 601.801280] BTRFS info (device loop5): using free space tree [ 601.809218] BTRFS info (device loop5): has skinny extents 12:29:34 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000034800000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:34 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)="6c4c7ea0b4d6b0aa8bf6004fbe56b0da2cd42b8d977be1e504f7ae332b1996fd33af068ff6208eb6578706e871394824fd2575e32864c782aa7d125dedc98cdad78bc2a6e7c33030cc1f1bba61493695b92ab801625c39ffd5d111ad7bc8616db2545a8b64fc0a2a3c2ea240444c7d3694a8c8f7"}, 0x20) r1 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) dup3(r1, r5, 0x0) 12:29:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f0000000880)) [ 602.026781] attempt to access beyond end of device [ 602.032338] loop5: rw=4096, want=2064, limit=267 [ 602.059805] BTRFS error (device loop5): failed to read chunk root 12:29:34 executing program 0: ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f00000000c0)={0x0, @bt={0x455, 0x1, 0x0, 0x1, 0x2, 0x0, 0x3c, 0x81, 0x7f, 0x3, 0x7fff, 0x9, 0x5ed, 0x1, 0x2, 0x6, {0x9, 0xa4f}, 0x20, 0xe0}}) r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 602.163205] BTRFS error (device loop5): open_ctree failed 12:29:35 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x40) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x77, "681df4186f4ae54e53cd874950e0ed92fe10650d19796057869a90108794dc6b4abb65b77f1a98e6f97d3340f14f0eea9c1c3ae17b191cee97e7d7e9c800a0969f0df0719da1a4fde6d907d4cf866e2d4f2b393fc50986049a09e39a65ca03098041a69b5b2c2c5c5d4d96580c8e9fddec072da53e2770"}, &(0x7f00000000c0)=0x7f) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000140)={r8, 0x20, 0x4, 0x40, 0x4, 0x41}, 0x14) ioctl$TIOCNXCL(r4, 0x540d) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:35 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8c000, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000040)=""/36, &(0x7f00000001c0)=""/4096, &(0x7f00000011c0)=""/247}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) sendto$inet6(r5, &(0x7f0000000100)="fce5bb3a0d334a828ec1db66627f0716dc94c826ab5c70c448cd2bd73ce2e8e00dfdb63a7ab62e24b044254269c1ed90d7cd77e9e1d0259fe916db7b0b860ed667306e77bdc52c01bb943a01", 0x4c, 0x8840, 0x0, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/vcs\x00', 0x41, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000001400)=@assoc_value, &(0x7f0000001440)=0x8) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r7, 0x0, 0xff02160) fallocate(0xffffffffffffffff, 0x6c, 0x92, 0x7) dup3(r0, r7, 0x0) r8 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, 0x0, 0x0) r9 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r9, 0x11b, 0x3, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r8, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)=ANY=[@ANYBLOB='\t@\x00\x00', @ANYRES16=0x0, @ANYRESOCT=r9], 0x34}}, 0x10) 12:29:35 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000034c00000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:35 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x440901, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:35 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f0000000100)={0x1, 0x8000, 0x2}) r6 = dup2(r1, r2) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x45000, 0x0) r8 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, 0x0, 0x0) splice(r7, &(0x7f0000000040)=0xf52b, r8, &(0x7f00000000c0)=0x88, 0xca, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r9, 0x0, 0xff02160) dup3(r0, r9, 0x0) 12:29:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:35 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) r5 = signalfd(r3, &(0x7f0000000000)={[0x400]}, 0x8) dup3(r0, r5, 0x0) 12:29:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:35 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000036000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 602.704749] BTRFS info (device loop5): enabling free space tree [ 602.743169] BTRFS info (device loop5): using free space tree [ 602.823680] BTRFS info (device loop5): has skinny extents [ 602.971384] attempt to access beyond end of device [ 602.976480] loop5: rw=4096, want=2064, limit=267 [ 602.998748] BTRFS error (device loop5): failed to read chunk root [ 603.038796] BTRFS error (device loop5): open_ctree failed 12:29:36 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) sched_yield() ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:36 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000000c0)=0x80) sendmsg$inet(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000140)="a507ef3e7afa01115ed88ef45ca5e5", 0xf}], 0x1, &(0x7f0000000200)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}], 0x18}, 0x90) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r1, r1, 0x0) 12:29:36 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000036800000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b", 0x24, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 12:29:36 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x5, &(0x7f0000000000)=@raw=[@map={0x18, 0x9}, @ldst={0x1, 0x1, 0x3, 0xb, 0xb, 0x0, 0xfffffffffffffff0}, @map={0x18, 0x2, 0x1, 0x0, r1}], &(0x7f0000000040)='GPL\x00', 0x800, 0x49, &(0x7f00000000c0)=""/73, 0x41000, 0x4, [], 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xa, 0x81, 0x5}, 0x10, 0xffffffffffffffff}, 0x78) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x2, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x100, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f00000006c0)={'ip6_vti0\x00', &(0x7f0000000640)={'syztnl1\x00', 0x0, 0x29, 0x7c, 0x3, 0x2, 0x20, @empty, @mcast1, 0x89, 0x20, 0x80000001, 0x9}}) read$rfkill(r5, 0x0, 0xff02160) r6 = socket(0x23, 0x5, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000600)={&(0x7f00000002c0)="43df7afc5c4de196bdd727b6aff064fd557d9614390bea5f9902e2b6f5f9451d477746320fb7b2e5f9b2b863b2a912be600177bb6b13597e03f14db4f286762982239013e6ca9647682f1a75e0883c6f28ccfba1f8defa6e5e049a2c510bb8ec07bc9b371861c93b35b1e7b195fa461d4e315c5c629f77d59ae05159972f7d95122259f1bdbf945a9a1ece78ed27151eb1aa78f28a5d6a1b0b2584b8b13b8e113fae349e280696889692691c95df4909fbf6648fce7c3a133e2c8cfc", &(0x7f0000000380)=""/246, &(0x7f0000000480)="646e34c6ac14139f6049afa1281e9ad90b11bfc227513b9abd8b188ab6260f8be8daec77af5baabda2d826430629fe32e9716a96aa9404cdd26dff1c489909bf2b4685a5ceeb812fa4d087df202429f4e0ca03d2082e5bc42316b85a3813ad4b00feb010dc5cd75de41db5420264b4b1ab76a92427877147b84e4d586d93074a3763", &(0x7f0000000540)="85877ca3dab554d10798364af6514b6a509baaa3b16118180e0e8c6d75e8fa9947dfe645388ac3929c6cb6f173dc37977c7f5d1abb2d47fd89a8b180036159a44f1e7c96eab8092b5f656d34c01213fdfff8291c164ff9f2156a1aa70b3d289f814cfd77516a10e02e7d859a949126e135885e63831a8c46e672d8cacad7f5c767f607392b262c7a8c49cb674992ae9173b008d1c0af8d0d7291b8ae73d5b69808911b4c", 0x2, r4, 0x4}, 0x38) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) dup3(r0, r6, 0x0) 12:29:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b", 0x24, 0x10000}], 0x0, &(0x7f0000000880)) [ 603.512353] BTRFS info (device loop5): enabling free space tree [ 603.519622] BTRFS info (device loop5): using free space tree [ 603.531845] BTRFS info (device loop5): has skinny extents 12:29:36 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = signalfd4(r5, &(0x7f0000000040)={[0x7ff]}, 0x8, 0x80800) ioctl$USBDEVFS_GET_SPEED(r7, 0x551f) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r8, 0x0, 0xff02160) dup3(r0, r8, 0x0) 12:29:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:36 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000036c00000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 603.714808] attempt to access beyond end of device 12:29:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b", 0x24, 0x10000}], 0x0, &(0x7f0000000880)) [ 603.740152] loop5: rw=4096, want=2064, limit=267 [ 603.757797] BTRFS error (device loop5): failed to read chunk root [ 603.799360] BTRFS error (device loop5): open_ctree failed 12:29:37 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:37 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x400000, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r4 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000100)=0xa000, 0x4) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) 12:29:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:37 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000037400000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 12:29:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:37 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040)={0x3f, 0x6, 0x40, 0xff, 0x0, 0xe0, 0x7f, 0x0, 0x81, 0x0, 0x80, 0x80, 0x3f}, 0xe) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) ioctl$BLKDISCARD(r4, 0x1277, &(0x7f00000000c0)=0xfffffffffffffffd) 12:29:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000880)) [ 604.478709] BTRFS info (device loop5): enabling free space tree [ 604.491647] BTRFS info (device loop5): using free space tree [ 604.506279] BTRFS info (device loop5): has skinny extents 12:29:37 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) ioctl$DRM_IOCTL_RM_MAP(r3, 0x4028641b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:37 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000037a00000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:37 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) r4 = dup2(r3, r3) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f0000000000)) dup3(r2, r3, 0x80000) [ 604.713516] attempt to access beyond end of device [ 604.718881] loop5: rw=4096, want=2064, limit=267 [ 604.744861] BTRFS error (device loop5): failed to read chunk root [ 604.798572] BTRFS error (device loop5): open_ctree failed [ 604.832094] BTRFS info (device loop5): enabling free space tree [ 604.849228] BTRFS info (device loop5): using free space tree [ 604.893550] BTRFS info (device loop5): has skinny extents [ 604.947697] attempt to access beyond end of device [ 604.956574] loop5: rw=4096, want=2064, limit=267 [ 604.963842] BTRFS error (device loop5): failed to read chunk root [ 605.010395] BTRFS error (device loop5): open_ctree failed 12:29:38 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x400c041}, 0x20000000) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:38 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 12:29:38 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003fe01000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:38 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000100)={0x2, 0x1, 0x0, [{0x40, 0x4, 0x8001, 0x9, 0x4, 0x3}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) sendmsg$OSF_MSG_REMOVE(r6, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x268, 0x1, 0x5, 0x801, 0x0, 0x0, {0x3, 0x0, 0x1}, [{{0x254, 0x1, {{0x3, 0x2}, 0x7, 0x80, 0x0, 0x200, 0x10, 'syz1\x00', "0a8e0a873407a1b277b3dc1f8f175e9bffed0ed76ee0097299c70c517aa1e0a3", "40658606d80ab8314228e7a5d4404425dd0e2e6825101d01e37667cfd9f10fe7", [{0x200, 0x200, {0x2, 0x8001}}, {0x400, 0x2, {0x1, 0x3e19}}, {0x722, 0x3ff, {0x3, 0x100}}, {0x800, 0x8000, {0x1, 0x8}}, {0x8001, 0x9, {0x1, 0x800}}, {0x3ff, 0x3, {0x3, 0xcb}}, {0x9, 0x9, {0x2, 0x101}}, {0x88, 0xc98, {0x3, 0xff}}, {0x5, 0x6, {0x1, 0x6}}, {0x9, 0x28, {0x3, 0x2}}, {0x81, 0x3f, {0x2, 0x9}}, {0x3, 0x1, {0x1, 0x400}}, {0x7, 0x11, {0x3, 0x40ceeb9d}}, {0x20, 0x0, {0x1, 0x28}}, {0x4, 0x8001, {0x95bb5830a74a75a5, 0x1000}}, {0x6, 0x101, {0x0, 0x20}}, {0x5, 0x0, {0x1, 0x98}}, {0x8001, 0x9, {0x0, 0x6}}, {0x2, 0x1, {0x1, 0x2}}, {0x0, 0x2, {0x3, 0x7fff}}, {0xfffe, 0x7b9b, {0x2, 0x3}}, {0x5, 0x4, {0x3, 0xffffa150}}, {0x401, 0x7fff, {0x2, 0x7ff}}, {0x9, 0x6, {0x3, 0x8001}}, {0x7f, 0xf8, {0x1}}, {0x20, 0x3f, {0x0, 0x7}}, {0x1, 0x400, {0x0, 0xf25}}, {0x2, 0x1, {0x0, 0x3}}, {0x400, 0x8000, {0x0, 0x5}}, {0x8, 0x200, {0x2, 0x3}}, {0x5, 0x9, {0x1, 0xff}}, {0x7ff, 0x200, {0x0, 0xffff00}}, {0x78b, 0x5}, {0x7, 0x4, {0x2, 0x1000000}}, {0x5, 0x8, {0x3, 0x4c}}, {0x2, 0x5, {0x0, 0x7e}}, {0x6, 0x7, {0x1, 0x2}}, {0x4eb, 0x9, {0x1, 0x5206}}, {0x46c8, 0xd38, {0x2, 0x6}}, {0x20, 0x8, {0x0, 0xfffffff9}}]}}}]}, 0x268}, 0x1, 0x0, 0x0, 0x20004081}, 0x44000) r7 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r8, 0x0, 0xff02160) dup3(r0, r8, 0x0) [ 605.348377] BTRFS error (device loop1): superblock checksum mismatch [ 605.381238] BTRFS error (device loop1): open_ctree failed [ 605.391018] BTRFS error (device loop1): superblock checksum mismatch 12:29:38 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030003000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 605.421120] BTRFS error (device loop1): open_ctree failed 12:29:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:38 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) keyctl$clear(0x7, 0xffffffffffffffff) [ 605.583118] f2fs_msg: 116 callbacks suppressed [ 605.583134] F2FS-fs (loop3): Invalid log sectors per block(196611) log sectorsize(9) [ 605.621647] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:29:38 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200800, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 605.662933] F2FS-fs (loop3): Unable to read 2th superblock [ 605.691500] F2FS-fs (loop3): Invalid log sectors per block(196611) log sectorsize(9) [ 605.770836] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 605.797034] F2FS-fs (loop3): Unable to read 2th superblock [ 605.866650] F2FS-fs (loop3): Invalid log sectors per block(196611) log sectorsize(9) [ 605.874855] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 605.899382] F2FS-fs (loop3): Unable to read 2th superblock [ 605.905234] F2FS-fs (loop3): Invalid log sectors per block(196611) log sectorsize(9) 12:29:38 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f00000001c0)={0x0, 0x0, 0x1, [0x1, 0x0, 0x4c63, 0x5, 0x368], [0x3ff, 0x4, 0x2, 0x4, 0xfffffffffffffffe, 0x401, 0x5, 0x1, 0xfffffffffffffff8, 0x1, 0x3, 0xffffffffffffffc1, 0x1ff, 0x1, 0x100000000, 0x7, 0x5, 0xfffffffffffeffff, 0xdbd, 0x9, 0x9, 0x7, 0xf329, 0x8, 0x10001, 0x1, 0x6, 0x6c9a, 0x0, 0x100000001, 0xb854, 0x3, 0x4, 0x401, 0x2, 0x0, 0x4, 0x1, 0x7c, 0x7, 0x81, 0x1, 0x0, 0x9, 0x8, 0xad4, 0xfff, 0xfffffffffffffffb, 0x1, 0x5, 0x4, 0xff, 0x10000, 0x8, 0x81, 0x10001, 0x100000000, 0x6, 0xfff, 0x3f, 0x2, 0x2, 0x0, 0x5, 0x9, 0xffff, 0x80000001, 0xfffffffffffffffb, 0x0, 0x0, 0x28, 0x8001, 0xfffffffffffffff8, 0xfff, 0x1, 0x3, 0x81, 0x1, 0x5d98, 0xffffffff, 0x1ff, 0x0, 0x35, 0x4a377ae1, 0xd, 0xdd, 0x9, 0xb9, 0x40, 0x2, 0x631a, 0xfffffffffffffffd, 0x4, 0x3, 0x2, 0x100, 0x6, 0x8ac, 0x40, 0x1, 0x1, 0x7, 0x2, 0x9, 0xff, 0x42b4, 0x2, 0x9, 0x40, 0x9, 0x0, 0x6, 0x2, 0x8, 0xffff, 0x0, 0x3, 0x1, 0xc2, 0x57d, 0x80000000]}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000600)={r1, 0x8, 0x0, [0x7, 0x4, 0x3, 0x9845, 0x7ff], [0x80, 0x1, 0x3, 0x3, 0xfffffffffffffff9, 0x3f, 0x91, 0x0, 0x8000000000000000, 0x3, 0x4, 0x594fd4ed, 0x20, 0x0, 0x549, 0x400, 0xe98, 0xfffffffffffffcb2, 0x101, 0x6, 0x1, 0x7, 0x1, 0x2, 0x3, 0x80000000, 0xbd, 0x802, 0x80000001, 0x3, 0x971, 0x1, 0x4ac, 0x3f, 0x1, 0x3, 0x71a47d74, 0x101, 0x6, 0x0, 0x9, 0x1ff, 0x9, 0x8, 0x5, 0x7, 0xffffffffffffff80, 0xff, 0x8001, 0x4a36, 0x0, 0x54b, 0x3f, 0x1, 0x80000001, 0x0, 0x81, 0xfe50000000, 0x7fff, 0x70b33f1b, 0xb9, 0x1f, 0x9, 0x91, 0x2000000000, 0x2, 0x1, 0x1000, 0x3, 0x9, 0xffffffffffffa79a, 0x2a2, 0x7f, 0x9, 0x4d2, 0x8000000100000000, 0x4, 0x464, 0x6, 0x8, 0xe5, 0x1756, 0x7ff, 0xff, 0x2, 0x0, 0x7, 0x1ff, 0x496, 0x7ff, 0xea, 0x5, 0x8, 0x8001, 0x7fff, 0x2, 0x7, 0x7, 0x3, 0x400, 0x9, 0x6, 0x7, 0x8, 0x10000, 0x81, 0x6, 0x1f, 0x7, 0x9c, 0x0, 0x2, 0x8, 0x100000001, 0x1000, 0x8b6, 0xfffffffffffffffa, 0x5c, 0x4bc3, 0x12, 0x80000000]}) r2 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x2, 0x8, 0x10000, 0x1, @remote, @private0, 0x8, 0x8000, 0xffff, 0x7ff}}) connect$can_bcm(r5, &(0x7f0000000100)={0x1d, r6}, 0x10) r7 = dup2(r3, r4) r8 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, 0x0, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r8, 0x4008f510, &(0x7f0000000ac0)=0xf6f) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000a40)={0x0, 0xfb, 0x6e, 0x2, 0xfb, "7f16370fb2cce75f375daf14e9f545a0", "cdc1126828855c73957e425e91850babe7b8edaf50e154504d1f616a3896d7ef87db5c2cb2cf33d519997280a654f154411be1ab547cf964f7f3ef523542daf18a5a3728a8f27be9ebf6e033465409177701f71763a578ea4a"}, 0x6e, 0x1) read$rfkill(r9, 0x0, 0xff02160) dup3(r2, r9, 0x0) 12:29:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:38 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x5, &(0x7f0000000000)=@raw=[@map={0x18, 0x9}, @ldst={0x1, 0x1, 0x3, 0xb, 0xb, 0x0, 0xfffffffffffffff0}, @map={0x18, 0x2, 0x1, 0x0, r1}], &(0x7f0000000040)='GPL\x00', 0x800, 0x49, &(0x7f00000000c0)=""/73, 0x41000, 0x4, [], 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xa, 0x81, 0x5}, 0x10, 0xffffffffffffffff}, 0x78) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x2, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x100, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f00000006c0)={'ip6_vti0\x00', &(0x7f0000000640)={'syztnl1\x00', 0x0, 0x29, 0x7c, 0x3, 0x2, 0x20, @empty, @mcast1, 0x89, 0x20, 0x80000001, 0x9}}) read$rfkill(r5, 0x0, 0xff02160) r6 = socket(0x23, 0x5, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000600)={&(0x7f00000002c0)="43df7afc5c4de196bdd727b6aff064fd557d9614390bea5f9902e2b6f5f9451d477746320fb7b2e5f9b2b863b2a912be600177bb6b13597e03f14db4f286762982239013e6ca9647682f1a75e0883c6f28ccfba1f8defa6e5e049a2c510bb8ec07bc9b371861c93b35b1e7b195fa461d4e315c5c629f77d59ae05159972f7d95122259f1bdbf945a9a1ece78ed27151eb1aa78f28a5d6a1b0b2584b8b13b8e113fae349e280696889692691c95df4909fbf6648fce7c3a133e2c8cfc", &(0x7f0000000380)=""/246, &(0x7f0000000480)="646e34c6ac14139f6049afa1281e9ad90b11bfc227513b9abd8b188ab6260f8be8daec77af5baabda2d826430629fe32e9716a96aa9404cdd26dff1c489909bf2b4685a5ceeb812fa4d087df202429f4e0ca03d2082e5bc42316b85a3813ad4b00feb010dc5cd75de41db5420264b4b1ab76a92427877147b84e4d586d93074a3763", &(0x7f0000000540)="85877ca3dab554d10798364af6514b6a509baaa3b16118180e0e8c6d75e8fa9947dfe645388ac3929c6cb6f173dc37977c7f5d1abb2d47fd89a8b180036159a44f1e7c96eab8092b5f656d34c01213fdfff8291c164ff9f2156a1aa70b3d289f814cfd77516a10e02e7d859a949126e135885e63831a8c46e672d8cacad7f5c767f607392b262c7a8c49cb674992ae9173b008d1c0af8d0d7291b8ae73d5b69808911b4c", 0x2, r4, 0x4}, 0x38) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) dup3(r0, r6, 0x0) 12:29:38 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)=0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x80000001) ioctl$KVM_GET_MSR_INDEX_LIST(r9, 0xc004ae02, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RTOINFO(r10, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x1000000, 0x8, 0x1000}, &(0x7f0000000140)=0xffffffffffffffd0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="b400a149a7f4d87ea4f43245524dacfcc54a70a0f69fd4b815846e0ccb5b0cdf13dc962f3bce7186f272a7d082"], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:38 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003fb03000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:39 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)="6c4c7ea0b4d6b0aa8bf6004fbe56b0da2cd42b8d977be1e504f7ae332b1996fd33af068ff6208eb6578706e871394824fd2575e32864c782aa7d125dedc98cdad78bc2a6e7c33030cc1f1bba61493695b92ab801625c39ffd5d111ad7bc8616db2545a8b64fc0a2a3c2ea240444c7d3694a8c8f7"}, 0x20) r1 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) dup3(r1, r5, 0x0) 12:29:39 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) write$9p(r3, &(0x7f0000000240)="7e1d41fd34c5a9add84f0d229925d47fff1e575f9a88c4e513e8457318eae6d4ab314b845f0d08b14619eb6781c8aa9cb98ad2a8da830272dfcb16ddf83687f9f0fc6c08e5ddd79e13401651d09126629ead103e859bd1fa07663a858c81fe19ed8c1987ddc6a4c778899497900d960d0d3808014fbea991cb7a19edb2fe924f69d329bb0d5e3367bcf9baec424d74029fce918f2bbc4e2094fd9809d042dd4688b4a6effbff481d34715e5a09a22848", 0xb0) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x80002, &(0x7f0000000140)={'trans=virtio,', {[{@dfltuid={'dfltuid', 0x3d, r4}}, {@cachetag={'cachetag', 0x3d, '-'}}]}}) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) fstat(r5, &(0x7f0000000300)) dup3(r0, r5, 0x0) [ 606.261196] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop1 12:29:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:39 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000034f04000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 606.331416] BTRFS error (device loop1): superblock checksum mismatch 12:29:39 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, 0x0, 0x0) sendmsg$NLBL_MGMT_C_VERSION(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_MGMT_A_CLPDOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4040) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) 12:29:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000880)) [ 606.387260] BTRFS error (device loop1): open_ctree failed 12:29:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:39 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035004000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 606.633170] BTRFS error (device loop1): superblock checksum mismatch [ 606.653868] BTRFS error (device loop1): open_ctree failed [ 606.794320] BTRFS info (device loop5): enabling free space tree [ 606.833469] BTRFS info (device loop5): using free space tree [ 606.854932] BTRFS info (device loop5): has skinny extents [ 606.945764] attempt to access beyond end of device [ 606.954014] loop5: rw=4096, want=2064, limit=267 [ 606.962289] BTRFS error (device loop5): failed to read chunk root 12:29:39 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:39 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000040)={0x5, 0x1b, 0x0, 0xffffffffffffffff}) r8 = dup(r7) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r8}) ioctl$DRM_IOCTL_GEM_CLOSE(r5, 0x40086409, &(0x7f0000000040)={r9}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000000)={r9}) 12:29:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:39 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035104000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 606.991847] BTRFS error (device loop5): open_ctree failed 12:29:39 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0x30) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) ioctl$int_out(r1, 0x5460, &(0x7f0000000040)) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x63, 0x3, 0x1f, "d4fbdfdddae5d2490026062bc010fa09", "a467f720b4ad43487d65e2f089be1f3adb91fbead94363acac62a38c47ec2a03869e0e0c8a102b8a48b84c999051b7fd13db9591b7f1993914ab9bb9e01e232e807c50c4a9a0d17a341633a5a3ac"}, 0x63, 0x2) dup3(r0, r4, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x1}, 0x16, 0x2) 12:29:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:39 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x92, "087cd1af093730496757dde188bdf14bf67c592f4593861403e63e688018e2d7d2554ca55563e59f6738c230f41c4b6074ccc5c8d02bd60cc3420daff1b5bb925b6d1874eafea2dea1d4eeeb6e3ad908728b28aef142fa314b467e1675f7db6648f89194762acd00c16632e155d9ae34b8aca020a402eb2bb330a5a8365c7c4c073b82e0816f69df71125a95e832f54bd5c6"}, &(0x7f00000001c0)=0x9a) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000000)={'team0\x00'}) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r6, 0x0, 0xff02160) dup3(r0, r6, 0x0) [ 607.204265] BTRFS error (device loop1): superblock checksum mismatch 12:29:40 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035204000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 607.259273] BTRFS error (device loop1): open_ctree failed [ 607.287739] BTRFS error (device loop1): superblock checksum mismatch 12:29:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:40 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000040)={0x0, 0x8, 0x855c, &(0x7f0000000000)=0x100}) r3 = gettid() r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001440)='/dev/nvram\x00', 0x2000, 0x0) ioctl$SIOCGETNODEID(r4, 0x89e1, &(0x7f0000001480)={0x2}) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x12) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) sched_getattr(r3, &(0x7f00000000c0)={0x38}, 0x38, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) ioctl$SNDCTL_FM_LOAD_INSTR(0xffffffffffffffff, 0x40285107) dup3(r5, r6, 0x0) [ 607.360921] BTRFS error (device loop1): open_ctree failed 12:29:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:29:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:40 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0xa02, 0x0) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f00000000c0)) r4 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x7, 0xa400) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4000000000400280) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_CROP(r8, 0xc038563b, &(0x7f0000000140)={0x0, 0x0, {0xa4, 0x0, 0x4e7, 0x9}}) read$rfkill(r5, 0x0, 0xff02160) r9 = dup3(r0, r5, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r9, &(0x7f0000000000)="104d01f3d115f14c2f79c216b7ae52fa80b4488a463bc0a14b6eb927f44e352a8ac7eac82bbcb6a196d09112b786205b210ea538f3e713dd", &(0x7f00000001c0)=""/213}, 0x20) 12:29:40 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035304000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:40 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1a3000, 0x0) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f0000000080)=0x10001) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x26, @private0={0xfc, 0x0, [], 0x1}, 0x3}, 0x1c) r6 = socket(0x11, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) accept$inet(r3, 0x0, &(0x7f0000000000)) r7 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='syzkaller0\x00', 0xfffffffffffffd81) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x2}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x100000, 0x0) [ 607.989757] BTRFS error (device loop1): superblock checksum mismatch [ 608.007098] BTRFS error (device loop1): open_ctree failed 12:29:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:40 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x3f50d429577d0840, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) read$rfkill(r7, 0x0, 0x2f2221b801c615b4) dup3(r0, r4, 0x0) [ 608.049631] BTRFS error (device loop1): superblock checksum mismatch [ 608.074172] BTRFS error (device loop1): open_ctree failed 12:29:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 12:29:40 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0x10000, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000140)={@hyper}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x20000004, 0x20}, &(0x7f00000000c0)=0xc) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) r5 = socket(0x9, 0x1, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) r6 = accept$nfc_llcp(r3, 0x0, &(0x7f0000000100)) r7 = socket$inet_smc(0x2b, 0x1, 0x0) r8 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, 0x0, 0x0) r9 = ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f00000001c0)={0x80000001, 0x7, 0x6, 0x0, 0x0, [{{r1}, 0x10000}, {{r6}, 0x2}, {{r7}, 0x9}, {{r8}, 0xffffffffffff7565}, {{r3}, 0x5}, {{r9}, 0xb373}]}) dup3(r0, r4, 0x0) 12:29:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:41 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035404000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:41 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 608.255795] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 0 transid 0 /dev/loop5 12:29:41 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000000)={0x7, 'hsr0\x00', {0x5}, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, 0x0) read$rfkill(r4, 0x0, 0xff02160) waitid(0x2, 0x0, 0x0, 0x1000000, &(0x7f00000000c0)) dup3(r0, r4, 0x0) 12:29:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 608.417437] BTRFS error (device loop1): superblock checksum mismatch [ 608.454687] BTRFS error (device loop1): open_ctree failed [ 608.532459] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop5 [ 608.558147] BTRFS info (device loop5): disk space caching is enabled [ 608.564879] BTRFS info (device loop5): has skinny extents [ 608.626285] attempt to access beyond end of device [ 608.635363] loop5: rw=4096, want=2064, limit=267 [ 608.677835] BTRFS error (device loop5): failed to read chunk root [ 608.715935] BTRFS error (device loop5): open_ctree failed 12:29:41 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_udp(0xa, 0x2, 0x0) fsync(r6) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r7, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:41 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xfffffffe) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:41 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035504000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000880)) 12:29:41 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 608.901155] FAULT_INJECTION: forcing a failure. [ 608.901155] name failslab, interval 1, probability 0, space 0, times 0 [ 608.933596] CPU: 1 PID: 7173 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 608.941430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.950777] Call Trace: [ 608.953359] dump_stack+0x22c/0x33e [ 608.957079] should_fail.cold+0xa/0x2f [ 608.960966] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 608.966073] ? lock_acquire+0x170/0x3f0 [ 608.970044] __should_failslab+0x153/0x1b6 [ 608.974713] should_failslab+0x5/0xf [ 608.978425] __kmalloc+0x2dd/0x4f0 [ 608.981959] ? __se_sys_memfd_create+0xf8/0x440 [ 608.986624] __se_sys_memfd_create+0xf8/0x440 [ 608.991109] ? memfd_file_seals_ptr+0x150/0x150 [ 608.995772] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 609.001144] ? trace_hardirqs_off_caller+0x6e/0x210 [ 609.006148] ? do_syscall_64+0x21/0x670 [ 609.010116] do_syscall_64+0xf9/0x670 [ 609.013906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.019084] RIP: 0033:0x45de59 [ 609.022266] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.041158] RSP: 002b:00007fa7ae02ea28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 609.048870] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 12:29:41 executing program 0: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x3f9, 0x800, 0x70bd2c, 0x25dfdbfb, {0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101242, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) [ 609.056138] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 609.063398] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 609.070676] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 609.077934] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 609.122846] BTRFS error (device loop1): superblock checksum mismatch 12:29:41 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VFIO_SET_IOMMU(r6, 0x3b66, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) read$rfkill(0xffffffffffffffff, 0x0, 0xfffffffffffffe50) dup3(r0, r3, 0x0) 12:29:41 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035604000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000880)) [ 609.200984] BTRFS error (device loop1): open_ctree failed 12:29:42 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) r5 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) pwrite64(r5, &(0x7f00000000c0)="1ae423a6600139df8079bdbea0c5034cf8bc03fc2677aa8d9a73393346afbef77738dc222605acf13e8f673f2f4a226a65daaee86dad72ff9c51d409680d0df9fa7cdfb2fa1a415703c8360fb782d7eada4bb90bc4dafa4f7972f753af682d525c89686742dc481e67c1395535bac451ca9139534fe38c64cc432ae8605b8bf513177165b73ec11fc1dc65d8a2290d38ce4a6d20b538356c1c8c0fac54cfc21fd038a13a9b41144d11eea5fd974352", 0xaf, 0x5) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 609.393545] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop1 [ 609.418704] BTRFS error (device loop1): superblock checksum mismatch [ 609.425692] BTRFS error (device loop1): open_ctree failed 12:29:42 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) write$binfmt_misc(r5, &(0x7f0000001440)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r4, @ANYRES64, @ANYRESDEC=0x0, @ANYRES16], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x100000, 0x0) 12:29:42 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:42 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$isdn_base(0x22, 0x3, 0x0) r4 = dup2(r1, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r2) dup3(r0, r5, 0x0) 12:29:42 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035704000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000880)) 12:29:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 609.746625] FAULT_INJECTION: forcing a failure. [ 609.746625] name failslab, interval 1, probability 0, space 0, times 0 [ 609.798116] CPU: 1 PID: 7233 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 609.805965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.815329] Call Trace: [ 609.817938] dump_stack+0x22c/0x33e [ 609.821586] should_fail.cold+0xa/0x2f [ 609.825491] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 609.830606] ? lock_acquire+0x170/0x3f0 [ 609.834606] __should_failslab+0x153/0x1b6 [ 609.838858] should_failslab+0x5/0xf [ 609.842576] kmem_cache_alloc+0x2b1/0x4a0 [ 609.846714] ? __alloc_fd+0x2ab/0x590 [ 609.850505] ? shmem_destroy_callback+0xb0/0xb0 [ 609.855160] shmem_alloc_inode+0x18/0x40 [ 609.859211] ? shmem_destroy_callback+0xb0/0xb0 [ 609.863868] alloc_inode+0x5d/0x180 [ 609.867483] new_inode+0x1d/0xf0 [ 609.870840] shmem_get_inode+0x96/0x8d0 [ 609.874806] __shmem_file_setup.part.0+0x7a/0x2b0 [ 609.879640] shmem_file_setup+0x61/0x90 [ 609.883607] __se_sys_memfd_create+0x26b/0x440 [ 609.888181] ? memfd_file_seals_ptr+0x150/0x150 [ 609.892861] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 609.898258] ? trace_hardirqs_off_caller+0x6e/0x210 [ 609.903267] ? do_syscall_64+0x21/0x670 [ 609.907254] do_syscall_64+0xf9/0x670 [ 609.911049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.916224] RIP: 0033:0x45de59 [ 609.919429] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.938318] RSP: 002b:00007fa7ae02ea28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 12:29:42 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f00000000c0)) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYBLOB="3f0000000100a8a3d006b4f6f39aefb301ef1329d19ed9bcaa4ab7ed6ee7cb1180e0c30a95963340d098018496be482cec6dbd4e0df17a60f7cc15bd80fef7c7d465c21c985e503d71b4af7dd05c36fcc93acd756a45c25766ad25132d6380b05b6b620a"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:42 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 609.946012] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 609.953271] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 609.960525] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 609.967780] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 609.975035] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:42 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 610.071307] BTRFS error (device loop1): superblock checksum mismatch 12:29:42 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035804000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 610.116068] FAULT_INJECTION: forcing a failure. [ 610.116068] name failslab, interval 1, probability 0, space 0, times 0 [ 610.135851] CPU: 0 PID: 7269 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 610.143701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.153067] Call Trace: [ 610.155676] dump_stack+0x22c/0x33e [ 610.159323] should_fail.cold+0xa/0x2f 12:29:42 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) r4 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000001c0)) r5 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) r6 = accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r6, 0x40189429, &(0x7f00000000c0)={0x0, 0x7, 0x5}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r5}) dup3(r0, r3, 0x0) [ 610.163232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 610.168353] ? find_held_lock+0x2d/0x110 [ 610.172436] __should_failslab+0x153/0x1b6 [ 610.176685] should_failslab+0x5/0xf [ 610.180410] kmem_cache_alloc+0x2b1/0x4a0 [ 610.184564] selinux_inode_alloc_security+0xe6/0x2d0 [ 610.189747] security_inode_alloc+0x67/0xc0 [ 610.194059] inode_init_always+0x5a3/0xb70 [ 610.198507] alloc_inode+0x7a/0x180 [ 610.202229] new_inode+0x1d/0xf0 [ 610.205602] shmem_get_inode+0x96/0x8d0 [ 610.209575] __shmem_file_setup.part.0+0x7a/0x2b0 [ 610.214415] shmem_file_setup+0x61/0x90 [ 610.218387] __se_sys_memfd_create+0x26b/0x440 [ 610.222963] ? memfd_file_seals_ptr+0x150/0x150 [ 610.227628] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 610.232986] ? trace_hardirqs_off_caller+0x6e/0x210 [ 610.238006] ? do_syscall_64+0x21/0x670 [ 610.241971] do_syscall_64+0xf9/0x670 [ 610.245762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.250939] RIP: 0033:0x45de59 [ 610.254121] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.273010] RSP: 002b:00007fa7ae02ea28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 610.280708] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 610.287965] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 610.295226] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 610.302484] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 610.309740] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 610.347614] BTRFS error (device loop1): open_ctree failed 12:29:43 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}, [@call={0x24}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) ioctl$BTRFS_IOC_DEFRAG(r4, 0x50009402, 0x0) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r7, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x9}, 0x16, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:29:43 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:43 executing program 0: r0 = socket$kcm(0x2, 0x0, 0x73) r1 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x9, 0x4, 0x11, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2, 0x8000, 0x7800, 0x40}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="0000000037fdd7fceb50faefc5cf435213a5a0bcf00679a8c18760b315fda2c0d545a09c80c09f7eb6a880995f2a06b6ddcc8ffa61a39e9da3cd04788856908c2597d49108c2f14d3a6758d21563865393f8ada5a8bd1bb96b1c988518e742cce010cbf8032205b5897cb4c1cff80f3c33559651d06a9fad92afb77279b36e537dcb89ceb93e39d51f32542e83b2c6b593f3d06681ae66831caef231212c389bcb769799f77f0432c2e6a55f2cd9", @ANYRES16=0x0, @ANYBLOB="010027bd7000fbdbdf2501000000080002000600000057e3c90a2adcbd92fc000000000000000000000000000001060005004e2400001c000180060005004e21000008000700", @ANYRES32=r2, @ANYBLOB="060005004e22000008000200030000000800020008000000"], 0x68}, 0x1, 0x0, 0x0, 0x20044884}, 0x8000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000000), 0x4) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r6, 0x0, 0xff02160) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x12) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) sched_getattr(r8, &(0x7f0000000100)={0x38}, 0x38, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x5}, 0x8) dup3(r0, r6, 0x0) 12:29:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:43 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035904000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 610.661859] FAULT_INJECTION: forcing a failure. [ 610.661859] name failslab, interval 1, probability 0, space 0, times 0 [ 610.711155] f2fs_msg: 129 callbacks suppressed [ 610.711170] F2FS-fs (loop3): Invalid log sectors per block(284931) log sectorsize(9) [ 610.738820] CPU: 1 PID: 7304 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 610.746649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.756038] Call Trace: [ 610.758628] dump_stack+0x22c/0x33e [ 610.762254] should_fail.cold+0xa/0x2f [ 610.766134] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 610.771227] ? lock_acquire+0x170/0x3f0 [ 610.775198] __should_failslab+0x153/0x1b6 [ 610.779423] should_failslab+0x5/0xf [ 610.783126] kmem_cache_alloc+0x2b1/0x4a0 [ 610.787269] __d_alloc+0x2b/0xa20 [ 610.790732] d_alloc_pseudo+0x19/0x70 [ 610.794524] alloc_file_pseudo+0xc6/0x250 [ 610.798738] ? alloc_file+0x510/0x510 [ 610.802530] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 610.808145] ? shmem_get_inode+0x44c/0x8d0 [ 610.812374] __shmem_file_setup.part.0+0x102/0x2b0 [ 610.817298] shmem_file_setup+0x61/0x90 [ 610.821358] __se_sys_memfd_create+0x26b/0x440 [ 610.825932] ? memfd_file_seals_ptr+0x150/0x150 [ 610.830590] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 610.835942] ? trace_hardirqs_off_caller+0x6e/0x210 [ 610.840975] ? do_syscall_64+0x21/0x670 [ 610.844942] do_syscall_64+0xf9/0x670 [ 610.848756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.853950] RIP: 0033:0x45de59 [ 610.857133] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.876022] RSP: 002b:00007fa7ae02ea28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 610.883718] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 610.890995] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 610.898260] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 610.905526] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 610.912788] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 610.936345] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. [ 610.953506] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:29:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 610.973921] F2FS-fs (loop3): Unable to read 2th superblock [ 610.981648] BTRFS error (device loop1): superblock checksum mismatch [ 611.008333] BTRFS error (device loop1): open_ctree failed 12:29:43 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 611.017157] F2FS-fs (loop3): Invalid log sectors per block(284931) log sectorsize(9) 12:29:43 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000001c0)={0x1, 0x0, "2587d394816ec8986bbaf84db685ca88a2a33990baa69b7226d78d840aaacbb4d49b3f02850caa4560b061fbd2009d9c2c57fc37fe89c020c893dc4acdfba3ae44c62a14d13696718456d71100f060969383c808388cfbdf1b940e42fab64533b7d8d26fc13b5107be014b6805c756f9a9b49229da66af8b41540d745db6da00cdfba930b9577acfaa198226d9627c52c7d2d35d3eab674e2c326103b66a401fb575562d4ee554f7ce4654c4f21693cf75f3a43d7247f64803"}, 0xc1, 0xfffffffffffffff8) keyctl$assume_authority(0x10, r3) r4 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) [ 611.057858] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 611.090196] F2FS-fs (loop3): Unable to read 2th superblock 12:29:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 611.142851] FAULT_INJECTION: forcing a failure. [ 611.142851] name failslab, interval 1, probability 0, space 0, times 0 [ 611.196244] CPU: 0 PID: 7337 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 611.204090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.213461] Call Trace: [ 611.216064] dump_stack+0x22c/0x33e [ 611.219711] should_fail.cold+0xa/0x2f [ 611.223621] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 611.228745] ? lock_acquire+0x170/0x3f0 [ 611.232733] __should_failslab+0x153/0x1b6 [ 611.236961] should_failslab+0x5/0xf [ 611.240662] kmem_cache_alloc+0x2b1/0x4a0 [ 611.244803] __alloc_file+0x21/0x330 [ 611.248508] alloc_empty_file+0x6d/0x170 [ 611.252556] alloc_file+0x93/0x510 [ 611.256086] alloc_file_pseudo+0x165/0x250 [ 611.260310] ? alloc_file+0x510/0x510 [ 611.264102] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 611.269739] ? shmem_get_inode+0x44c/0x8d0 [ 611.273991] __shmem_file_setup.part.0+0x102/0x2b0 [ 611.278921] shmem_file_setup+0x61/0x90 [ 611.282887] __se_sys_memfd_create+0x26b/0x440 [ 611.287460] ? memfd_file_seals_ptr+0x150/0x150 [ 611.292151] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 611.297501] ? trace_hardirqs_off_caller+0x6e/0x210 [ 611.302508] ? do_syscall_64+0x21/0x670 [ 611.306475] do_syscall_64+0xf9/0x670 [ 611.310269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.315461] RIP: 0033:0x45de59 [ 611.318652] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 611.337548] RSP: 002b:00007fa7ae02ea28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 611.345268] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 611.352533] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 611.359791] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 611.367055] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 611.374311] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:44 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:44 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) r5 = epoll_create(0x8) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000000)=0x400) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x4) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x81}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000000) [ 611.392494] F2FS-fs (loop3): Invalid log sectors per block(284931) log sectorsize(9) [ 611.401923] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 611.417473] F2FS-fs (loop3): Unable to read 2th superblock [ 611.426104] F2FS-fs (loop3): Invalid log sectors per block(284931) log sectorsize(9) [ 611.525709] FAULT_INJECTION: forcing a failure. [ 611.525709] name failslab, interval 1, probability 0, space 0, times 0 [ 611.538832] CPU: 1 PID: 7357 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 611.546660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.553642] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. [ 611.556020] Call Trace: [ 611.568141] dump_stack+0x22c/0x33e [ 611.571787] should_fail.cold+0xa/0x2f [ 611.575692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 611.580807] ? lock_acquire+0x170/0x3f0 [ 611.584802] __should_failslab+0x153/0x1b6 [ 611.589047] should_failslab+0x5/0xf [ 611.592777] kmem_cache_alloc+0x2b1/0x4a0 [ 611.596948] selinux_file_alloc_security+0xe4/0x1c0 [ 611.601980] security_file_alloc+0x40/0x90 [ 611.606228] __alloc_file+0xc9/0x330 [ 611.609958] alloc_empty_file+0x6d/0x170 [ 611.614042] alloc_file+0x93/0x510 [ 611.617603] alloc_file_pseudo+0x165/0x250 [ 611.621858] ? alloc_file+0x510/0x510 [ 611.625693] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 611.631443] ? shmem_get_inode+0x44c/0x8d0 [ 611.635697] __shmem_file_setup.part.0+0x102/0x2b0 [ 611.640650] shmem_file_setup+0x61/0x90 [ 611.644649] __se_sys_memfd_create+0x26b/0x440 [ 611.649253] ? memfd_file_seals_ptr+0x150/0x150 [ 611.653958] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 611.659337] ? trace_hardirqs_off_caller+0x6e/0x210 [ 611.664370] ? do_syscall_64+0x21/0x670 [ 611.668363] do_syscall_64+0xf9/0x670 [ 611.672178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.677374] RIP: 0033:0x45de59 [ 611.680579] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 611.699490] RSP: 002b:00007fa7ae02ea28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 611.707211] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 611.714490] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 611.721778] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 611.729065] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 611.736349] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:44 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:44 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000035a04000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:44 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, 0x0, 0x0) r2 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, 0x0, 0x0) r3 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, 0x0, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) ioctl$ASHMEM_PURGE_ALL_CACHES(r4, 0x770a, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x7f, @loopback, 0xffffffc0}}, 0x8, 0x2}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000001c0)={r6, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}}}, &(0x7f0000000040)=0x84) dup3(r0, r5, 0x0) 12:29:44 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r4, 0x80045700, &(0x7f0000000000)) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @empty, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x100, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000003a80)='/dev/vcs#\x00', 0x29d, 0x521080) sendto$inet6(r7, &(0x7f0000003ac0)="bbe42a24c8493bbd5ff75b1fc37c8f80f2460720259e820656be1abe49917416401fcad14fbb9659e94f5eea0da894348fc4460a08785742c06743053416c080512f221c24a9c5fb00069f84c963e8b875df2a31d4f93751d4f1ebbf547175fece29c88659f42845a3634a12857fc577ab32be14843cb28f489d894a182c5408745f2f9279d38917b6a8831b", 0x8c, 0x50, &(0x7f0000003b80)={0xa, 0x4e21, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x37}}, 0x3ff}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) r8 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, 0x0, 0x0) sendmmsg$alg(r8, &(0x7f0000003900)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000000140)="e7a3f57512214bb0b4b6e9b50e0293b7aee690c325fd69bea883278bb2528f232535c8752a2aeb0ceba2eb83a457f7a5178864c96f124fa3baefcd580aec43d66d81d3a1c4513ad2e58cb0422de423c64493ab0f03d48a4d07ab487abfa3dcf0b9fd48108ca58dda942edbcf481f9b5f84cb5828d2bebef97e2b59f880e26e2cb5fcffb2ca9283d6ba9ecbe2b47a798a27f2d298975f24372963d2f112548f3dbb5d8aa9", 0xa4}, {&(0x7f0000000080)="1887f3f69929e9802ad8099eb8e87c26dfae34bd29c640dc35966df619ca4e7a64cc9dbe013ab3afead3f180386a2e3b5d6d63ef8730e006c984b7c7f20ed35e413f565db8b0a73e0db9", 0x4a}, {&(0x7f0000000280)="79d88bc5a96d1de92cdd5e68b14f2327b666867a384a3a270074f8d18c458a2ceaf45288170e6c7559b04438ba9af2e83cd6a199c888ca720bd3735cdaaf2acd31bbbc3774c18066de343f7a38b3d7f793c1c2af3dc449a6cc33add4f3a17c5efb85aec35809c095a9b535bd81bcb4cee1f9a457a9e96642793d5aab1c8749be731cd1892e4a1b1010a4fb6b2a10cc02", 0x90}, {&(0x7f0000001400)="7f24967a2b29272a8d367941f0b85b3e16f1bb0cf86f8a3e5dc27001c59f2d6d4f0c4970f50967af8c0948a2a17badfc719bccce224946504456ec02c48c00db661f241e0189e33aa44f26f819b2b2b712f2731c7fd95bf70781d5200dd87ddec5baeec07ff8b75438860acd2ecf9abc2fa54a82405dbe12fb316c5b6f59357ee3396e3efe7045e563588426ee31871e947670df4de7b68347b20979cbcc705213", 0xa1}], 0x5, &(0x7f00000014c0)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0xfffffffb}, @op={0x18}], 0x1048, 0x48004}, {0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002540)="f9a4a3c565f202f843636f5062c11e74a8e5f9478e7f51a81b9b0485b29949fdcc15ed32fcfe9c28767aee9989a7eb7994f75fa3ed042b61d3e0b849e81ab03fc59dc8b072041d0ce9850559f5eb4946838d7f64d89bf3b51cffc45721d0139c32960b6b07fe3d78b986d946dbc416e676c439854b7498f75b61cb1e2fd7a17ad33d338187e0297b7947c5f18f35bd3e73fa93fc28086755f1d7f874195879de20e1169115a46defda4e8917ae1b613369cd", 0xb2}, {&(0x7f0000002600)="66fe616cd5ab2c438f0bc803c352aafb24ae1da0d53003aabb2c21e43e4b3a30bc1647125c86aae7c03368b36daf22b87d754d24080a0b42b4131cfe742496466502f1f8841b560ecf69f29362abc8fc0f16479f067800da3e116e1580", 0x5d}, {&(0x7f0000002680)="8622cd1e81d2f68cf266b9105f7e79f645f6c909fc41834925ae79241c2d20246f03868691a7e13076dad1bc5add768ff7fe63fa2fd3d049ebb18c9e30ed66484f74f6848ab2995983a2769b604061fd0cce838bfe58c32934bf9081ce150ba40bf16c7079e34d6e92ad1928d8cce717722b19cec32149b5c9fc5e61322087a4a3dbc7a8992dfe1803b271143363ea6dd83d0a8dacb53ec35aa8927b73c1ea25e1b00d943e0b2abea2b6af23fb7ecb735c784bc116f2ff1b558577ed3e6864ae007fb74430921531caf7e14698eca214eeb441574ae398a54b4b43665430b3f74f139d5ccc0f6d93205eddfbea1c", 0xee}, {&(0x7f0000002780)="ce41df24c6e14cbe64e7bf4f534e9d9827c939495b368121126cc8d0c81b79b3e46e1b4c5bd9985804ef243e4dcf6aa00c1c02c95be9b16c5b83e6bf19707a759fedd3191adddae0f3416b5229a50b298e7a3cbdd124e1ae9eab3042f552594b47b759f4db145a78f74a5b94a8ce", 0x6e}], 0x4, &(0x7f0000002800)=[@op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x4fc}, @iv={0x88, 0x117, 0x2, 0x6d, "f5590b4211887bb9eb42d4fff9860c09636608c1fc2ae2938bc1afc44cadf222e9614935fe94973b86608e5a095104d60ed6f6da2886dec8e8625a6a946d84e7eed5882d735c81c9400c54d4ad8c3422d6bdcf59b520bff044d77cf9ff0a22214bef086adcda9515aa7b44a619"}, @op={0x18, 0x117, 0x3, 0x1}], 0xe8, 0x80}, {0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000002900)="e5e3be89f453c8aa80bd7a63e1d03a168b500970588767ab12fa4f724cb6c89e6a4d06f2ad42f6ab130af9d790faf7cba2f6439accc0b85cd461064ddfee31240dd49d9ec58959f70a5660d57c669871ee6f28ad44d386a4161a26b421702e81b5beac63f21db32c6a61e4d97c1966392cea6706c03107aada0e9e14d718bee76013cd2f0bec56a7d38f25810dc7bbf98f4043e4cf2bc79ceeff0bb0e9a6ce2ecc5755f515f2a7f1e9902be200b8334ffe464ca68bd7e5963ff5954855e41a5961152e0bcd6778a83e9283d4d9cfcae377bbf2799ceeb1053f43983c6c252297ced6eaebd31b318cd6a76393", 0xec}, {&(0x7f0000002a00)="922c083a25fe611d9e3fc402eee885d153cf8d825799b1a5dfe6670b270872d32cf70fa2", 0x24}], 0x2, &(0x7f0000002a80)=[@assoc={0x18, 0x117, 0x4, 0xfffffffd}, @assoc={0x18, 0x117, 0x4, 0x1}, @iv={0x78, 0x117, 0x2, 0x5e, "f6d074a51376a84ff203faf931807ed0e98f898f98b61ee78bd15142af3a9c8ee50f270c8c885955607d4afe347b67befda28444130739cfa4bd46bc38d0bce7112b93d6f865b8bedceba978ddec3fce765fe683f485db97beeb34b29406"}, @op={0x18}], 0xc0, 0x20000040}, {0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000002b40)="9a20fb9ad4136d1a24", 0x9}, {&(0x7f0000002b80)="1ac6940a343f63e38c00f1390493c023e9e63cea762ab812272a13a0c49dd6327a3e0dd6e4fd3f03aadd6c72a13e580ee7a9509cc40841b729f7e5b14c85dfff3a81f92edb116b1fa8a3d83950f494175b6f69332542e4ead1844ff29c6e335fb2357b4b637c428f2257a69b594e73da2cbeaf506d81720641b0defe77e96d17d345f28c3e2aafda1f852b61292e4f85956503ba80cb", 0x96}, {&(0x7f0000002c40)="1b53cc6ed9", 0x5}, {&(0x7f0000002c80)="25ad609a2b32eba100ac2bbbb85134a4f2d2e0be954e692fe1f2045c11c54d05028d6a1a9fded4d10d4240156e79d6a5d147d80474a58a13c5e3deed106d0bfa8ded5c6b91b5b6d6a8d8a04f80c30b2aa8fdf7592d5317295ce1e88ac3e585de6c2119", 0x63}], 0x4, &(0x7f0000002d40)=[@op={0x18}, @iv={0x78, 0x117, 0x2, 0x5e, "b6ac35ec492ca46ee5984aac542c2147ec8d4bca15669090f13e12911a60f5a5800d89dd22adfdbb2764beaa9b7d8e9500e276ced2aa8cc43a46693bc981774d7cee398daa1881e09aeb00f8ce4e439b8601ec9a4c34de7634e917d1f57d"}], 0x90, 0x8000004}, {0x0, 0x0, &(0x7f0000002fc0)=[{&(0x7f0000002e00)="68c0c61b19be41832a3d4c567efda2589b669a735616de2ff8634c47a9f5701734445fdb5b3dc996da1ef07e2f0d5678cacff7f2ab28279c4820fc85ba2e8303c46d5d311a0cfdfae830687a613f835244008889765233644648312fdd5c79a136e5e21fea1b7a97cb086f9ebb9443b4c87c9afca3b0acd5e83de3f765114566855ea7d098b2015358d678514ba4c39fe52d482999e6a5f0bd434775a55901232c898c35ae12eeaa26174ee6c2848a7bca", 0xb1}, {&(0x7f0000002ec0)="e1132662d351c4428544955125104bec78b7021c43a018426aae83e5270c62abc1268069f3a627984db38360a1920d68428344c1e97c646c9adc3afc620f67856d3dd61176ecf09e5efcb8959354a7ce08ac7eafc1e04b41795daa27f0c1ceadc56a5b068c6bf4754e63aeefde7b66d5f45045b9416483f5ea822ec10bc95bbb4bc570eed9be09c1037efff3e7fd2faa2826748a198bb01fdc61cadc51374889efc95d6b7b5b37aa2b403efb3bb1175bce69de728ff62350b509bda2cf866b7784edd6fa63b70b74ba0e", 0xca}], 0x2, &(0x7f0000003000)=[@assoc={0x18, 0x117, 0x4, 0xffffff3d}, @iv={0x110, 0x117, 0x2, 0xf8, "113c011fd7924cc36b92bfe8a740a7323da820b0aa7b4e2b2751c0909c171983e89a1691a6603106f5eaf31fcba162aba563778b37970258cf6f92f489079beb5ee4e5d1e91c769476ae5b4a97b7429e4b960da90c924118e340066bac13b1dd89cee159ff49ba9d2ecd70665861fdb74731661ea9fbf4d037533ca107dd2eb0f017198a39d5b457e5cf2cac7c07afff24f928b685c1b124933c059350a53bde892d2f662bf7550e81fa5d3b21fe6ef6e2507d04a64f5ca7e511a5cd4ff2f2d9d4747d673bc7ce52f3ea14d2b027a1576212339d18536248304d87a8c8b2b6a8ce99da62d6246e71ac99d7d6dc3dcc452521f2e62f62c7b4"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3}, @iv={0x108, 0x117, 0x2, 0xed, "5866fda0e3b37b14016f7c08ad59c1657bf05122a2e7b690ed203834f1a05f8c9709c1ccf575fc89d1fc74c54a4d808cb5fb8f6a5df6ef592bf326343bb204a458cfd7806dac31c56a4378bab52895c90732c2e803e662ea7c3bf1362c27bed3fe4ab321b90bdeacfb6be534f7cc8bd9f488b53f238241c2fbf22673dd07f79a278e664a637346423d29d6254d6b590213ccc5bf725e82092134193183d7a5fd30acbae9f3ef62e9cec2749339d95343e4d9a08e994b30dfb28c6b2bbc9a7df78891bded51ef916907d20e0acf7ad1a2acf41ef1a0ff018a03f46bc518cca337d9f39d3d001a56bd7755c8ab19"}, @iv={0x80, 0x117, 0x2, 0x66, "da3c59d1284f74e72cbc42eaad8c253d5d6e221438b981046e28b03037b99bd407e4161d7d457d576639b706f777b62ce1d727fc4de225b2cb9e3794025b7fd11b8e2c1281ff339f595868ec4a38237bf06c0703246c57a2e748db24568dc34ba573f85c787e"}, @iv={0xf8, 0x117, 0x2, 0xe4, "41d6c57d20bb55b2ae726a1b408f829b27b63f6254787f639a62cca4a1a5f53ea1cb163bedb77ef9c02a17ebc9e5b84e328928cbac77898eb0960236c1582b1326464cb9c31ab54daa84075ebdf590b22ec65a496617ab68dcbf6bc67cbd4443ce0b2f3168a6c3aa3c3a9d45e07c96fe5b8860fcf4eeba99906eec9d4207abf440a7c262b54afd4f28fccef1c4f9294088b61deaac09a9ca2a99d81c89478624a34c1eba9bb914a2fc3bc7c80b9ff1ecd30b9e91939eca0aad6115ee0d2dff6baaef7e822aa4afa7b70bb874df57b0f47e8c194f28c43ed5a989dda41b7bff14a2c3a505"}], 0x3f0}, {0x0, 0x0, &(0x7f0000003780)=[{&(0x7f0000003400)="a720258688ba2fa198bcd39443a2418635f381236d576e4b9f7b1cb1a214dc0ff493eba16149831e3f85374503d01551d2d07ca2d45ba8dfc1e0108825675742a12a77f2b2671564bb7a6c7a882a870edb2211ac7466c4", 0x57}, {&(0x7f0000003480)="d059653103af6786c26f8ce1fb754f8c22e70f9287eec0a871cca464f381073a15f61bfd7876a529b9af280203fcbd429a4c5f7b5e1f87a3778924ce6568f38f164800dad260e48544d4ca66f42ebbb8", 0x50}, {&(0x7f0000003500)="e86e2c74cd1a5d59b939f48faa395584138cc87e", 0x14}, {&(0x7f0000003540)="993686f70dde9ded428ad413f8ea517d58ffc8390f8b275cc89ab3057f7735d17ab4bff954cd50a4c5a9abb875695ba56044a5e6f25f9e3273e789f7fbd8f355dd4ddc64bc16cf9300", 0x49}, {&(0x7f00000035c0)="cc8f4ce1c87367bcc7d51a42b658dbfb083a62aad39d8e28e6748200c8c091218d4bf924596841fad56c670f6dff1ef777849c1bda685d045f93fc9fb537e856754084cf5a9fb24e", 0x48}, {&(0x7f0000003640)="d9818c4ef3657d0a5a8898bd529e1bf64351c2aa8198996b0446525f1b31a43fd15a7aaec77e43439883e3c647f9879eb058e8a21a1c9b675b7b3e3ef0b33b3c5a767766270540f1aa124d9a11e07d1dc7de021193b80f986b1b1720b8497105074e1c462c2105804824", 0x6a}, {&(0x7f00000036c0)="0c3b131515f0da0986c2b6e454c968ef9ed188da27dfd0b48f8fe9ad06b8fbbd28c924b7cab438f60c2b6b76793d167543521d79a1949a70b19eaae35b7d2e52f09c29c8cb4c03133f81fd96a2fb07781dd0b8cccec892ffe7bd7b1fed6705fb5a92e0c8a4cc46e82807a60c9a5220b9cd961b390c813470793d4077b173b769bf144110984aa3397377993ede7f6e0df8b63bf46bae8f90769ac60c8a8a404b", 0xa0}], 0x7, &(0x7f0000003800)=[@iv={0xd8, 0x117, 0x2, 0xc3, "1284e7e7a078b1f6e45ccdbbcd99582ed19e14843bcc4dca719ea169ea42a16fcc8098fbe518f32bc388270a0fc417af2a4445948e19c391a3fa6a20b6c485fd85414a17ed6511d7296a62b0d683f8e1b1781a7a7f254c168d6f446b581599d50b06d593d124ad17350bda22312f138d6780323f72dfe758c52531391de75685ff575807180e7c6b21ef4c3e1125929c141c7b51ff36dc6d6bd22da01c326210c00e3eccfc049d9572befd29f1aedb5714828756cb96cd28f31556babdfa57a2db8aea"}], 0xd8, 0x40}], 0x6, 0x40) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:44 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 611.813348] BTRFS error (device loop1): superblock checksum mismatch [ 611.830066] BTRFS error (device loop1): open_ctree failed [ 611.882161] FAULT_INJECTION: forcing a failure. [ 611.882161] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 611.886339] FAULT_INJECTION: forcing a failure. [ 611.886339] name failslab, interval 1, probability 0, space 0, times 0 [ 611.903395] CPU: 0 PID: 7377 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 611.913075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.922443] Call Trace: [ 611.925045] dump_stack+0x22c/0x33e [ 611.928690] should_fail.cold+0xa/0x2f [ 611.932585] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 611.937692] __alloc_pages_nodemask+0x256/0x2a60 [ 611.942454] ? static_obj+0x50/0x50 [ 611.946068] ? mark_held_locks+0xf0/0xf0 [ 611.950124] ? __lock_acquire+0x6ec/0x3ff0 [ 611.954350] ? mark_held_locks+0xf0/0xf0 [ 611.958405] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 611.963242] ? __lock_acquire+0x6ec/0x3ff0 [ 611.967484] ? find_held_lock+0x2d/0x110 [ 611.971559] ? avc_has_perm_noaudit+0x1fd/0x3e0 [ 611.976226] ? lock_downgrade+0x750/0x750 [ 611.980367] ? lock_acquire+0x170/0x3f0 [ 611.984334] ? avc_has_perm_noaudit+0x9c/0x3e0 [ 611.988910] alloc_pages_vma+0xf2/0x800 [ 611.992888] shmem_alloc_page+0x11c/0x1f0 [ 611.997024] ? shmem_swapin+0x220/0x220 [ 612.001005] ? percpu_counter_add_batch+0x126/0x180 [ 612.006017] ? __vm_enough_memory+0x316/0x690 [ 612.010505] shmem_alloc_and_acct_page+0x15a/0x880 [ 612.015445] shmem_getpage_gfp+0x4e9/0x3a70 [ 612.019767] ? current_time+0x6f/0x1c0 [ 612.023679] ? shmem_alloc_and_acct_page+0x880/0x880 [ 612.028774] ? iov_iter_fault_in_readable+0x25c/0x510 [ 612.033956] ? iov_iter_init+0x1d0/0x1d0 [ 612.038011] shmem_write_begin+0xff/0x1e0 [ 612.042159] generic_perform_write+0x1f8/0x4d0 [ 612.046739] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 612.051401] ? current_time+0x1c0/0x1c0 [ 612.055369] ? lock_acquire+0x170/0x3f0 [ 612.059353] __generic_file_write_iter+0x24b/0x610 [ 612.064292] generic_file_write_iter+0x3f8/0x729 [ 612.069081] __vfs_write+0x51b/0x770 [ 612.072801] ? kernel_read+0x110/0x110 [ 612.076695] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 612.081706] ? rcu_sync_lockdep_assert+0x99/0x100 [ 612.086717] ? __sb_start_write+0x194/0x350 [ 612.091034] vfs_write+0x1f3/0x540 [ 612.094587] __x64_sys_pwrite64+0x1f7/0x250 [ 612.098901] ? ksys_pwrite64+0x1a0/0x1a0 [ 612.102954] ? trace_hardirqs_off_caller+0x6e/0x210 [ 612.108049] ? do_syscall_64+0x21/0x670 [ 612.112022] do_syscall_64+0xf9/0x670 [ 612.115820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.121006] RIP: 0033:0x4179b7 [ 612.124189] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 612.143097] RSP: 002b:00007fa7ae02ea20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 612.150805] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004179b7 [ 612.158064] RDX: 000000000000012b RSI: 0000000020010000 RDI: 0000000000000004 [ 612.165327] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 612.172588] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 612.179869] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 [ 612.187148] CPU: 1 PID: 7379 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 612.194964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.204326] Call Trace: [ 612.206930] dump_stack+0x22c/0x33e [ 612.210582] should_fail.cold+0xa/0x2f [ 612.214487] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 612.219609] ? lock_acquire+0x170/0x3f0 [ 612.223608] __should_failslab+0x153/0x1b6 [ 612.227863] should_failslab+0x5/0xf [ 612.231593] __kmalloc+0x2dd/0x4f0 [ 612.235145] ? __se_sys_memfd_create+0xf8/0x440 [ 612.239844] __se_sys_memfd_create+0xf8/0x440 [ 612.244358] ? memfd_file_seals_ptr+0x150/0x150 [ 612.249042] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 612.254423] ? trace_hardirqs_off_caller+0x6e/0x210 [ 612.259456] ? do_syscall_64+0x21/0x670 [ 612.263448] do_syscall_64+0xf9/0x670 [ 612.267263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.272457] RIP: 0033:0x45de59 12:29:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4f", 0x122, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 612.275660] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.294573] RSP: 002b:00007fa6989d6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 612.302298] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 612.309590] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 612.316874] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 612.324154] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 612.331449] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:45 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:45 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:45 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) r4 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x2000, 0x0) r5 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x48001, 0x0) dup3(r6, r5, 0x0) r7 = socket(0x29, 0x4, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) r8 = socket(0x23, 0x5, 0x0) ptrace$peek(0x3, 0x0, &(0x7f0000000140)) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r8, 0x8030942b, &(0x7f0000000100)={0x1, {0xd0896e7202c82aa3, 0x7f, 0x5, 0x1, 0x7fffffff}}) setsockopt$packet_int(r7, 0x107, 0x12, &(0x7f00000001c0), 0xfffffffffffffed8) [ 612.444628] BTRFS error (device loop1): superblock checksum mismatch [ 612.464902] FAULT_INJECTION: forcing a failure. [ 612.464902] name failslab, interval 1, probability 0, space 0, times 0 [ 612.476530] CPU: 0 PID: 7409 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 612.484502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.493845] Call Trace: [ 612.496486] dump_stack+0x22c/0x33e [ 612.500109] should_fail.cold+0xa/0x2f [ 612.504027] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 612.509125] ? __lock_acquire+0x6ec/0x3ff0 [ 612.513345] __should_failslab+0x153/0x1b6 [ 612.517614] should_failslab+0x5/0xf [ 612.521392] kmem_cache_alloc+0x43/0x4a0 [ 612.525454] ? __lock_acquire+0x6ec/0x3ff0 [ 612.529687] radix_tree_node_alloc.constprop.0+0x1e4/0x390 [ 612.535313] __radix_tree_create+0x382/0x680 [ 612.539712] __radix_tree_insert+0xbb/0x660 [ 612.544032] ? __radix_tree_create+0x680/0x680 [ 612.548644] ? lock_acquire+0x170/0x3f0 [ 612.552602] ? shmem_add_to_page_cache+0x306/0xc80 [ 612.557515] shmem_add_to_page_cache+0x616/0xc80 [ 612.562267] ? shmem_recalc_inode+0x310/0x310 [ 612.566756] ? __radix_tree_preload+0x262/0x340 [ 612.571422] shmem_getpage_gfp+0x20b0/0x3a70 [ 612.575824] ? current_time+0x6f/0x1c0 [ 612.579702] ? shmem_alloc_and_acct_page+0x880/0x880 [ 612.584792] ? iov_iter_fault_in_readable+0x25c/0x510 [ 612.589973] ? iov_iter_init+0x1d0/0x1d0 [ 612.594028] shmem_write_begin+0xff/0x1e0 [ 612.598170] generic_perform_write+0x1f8/0x4d0 [ 612.602747] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 612.607425] ? current_time+0x1c0/0x1c0 [ 612.611398] ? lock_acquire+0x170/0x3f0 [ 612.615362] __generic_file_write_iter+0x24b/0x610 [ 612.620300] generic_file_write_iter+0x3f8/0x729 [ 612.627055] __vfs_write+0x51b/0x770 [ 612.630775] ? kernel_read+0x110/0x110 [ 612.634665] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 612.639671] ? rcu_sync_lockdep_assert+0x99/0x100 [ 612.644501] ? __sb_start_write+0x194/0x350 [ 612.648814] vfs_write+0x1f3/0x540 [ 612.652344] __x64_sys_pwrite64+0x1f7/0x250 [ 612.656653] ? ksys_pwrite64+0x1a0/0x1a0 [ 612.660707] ? trace_hardirqs_off_caller+0x6e/0x210 [ 612.665731] ? do_syscall_64+0x21/0x670 [ 612.669707] do_syscall_64+0xf9/0x670 [ 612.673498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.678675] RIP: 0033:0x4179b7 [ 612.681856] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 612.700745] RSP: 002b:00007fa7ae02ea20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 612.708442] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004179b7 [ 612.715699] RDX: 000000000000012b RSI: 0000000020010000 RDI: 0000000000000004 [ 612.722955] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 612.730233] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 612.737488] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 12:29:45 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = dup3(r0, r0, 0x80000) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000000c0)="15fca7ad95aba5011d573b53c13ba01539137700482dbe04af5bf9696b4e582557538b614529688ac9aab569bdbc96fc8ef9e1bf096f3bc1e3702b89bfe9b701c5f569f6a879797d58240aa6a25a8bec4435588c32cb19800e72c3ba7817b7495ab0b7ef022dae8977f51413979b0588c5f5899d788ee4f579307ae947cabbe739886c8e41b26d81bc57664315dc3d92c194aa2a1fa62e657f00f33d", 0x9c}, {&(0x7f00000001c0)="c6d85986c712577eb3676369b22de5f1b238faaeb47b2e3bfc47f2a362cb17c11d5765e2b91e19d9cbaccffd9675c9a2dd88f0c11a5cd25f156f1c9976c6289ce183a805b365d7fbd0499c47e7f78edade4497926bc2c2c0ab2838df430b9fe536f393737e2269602a0d4fba085cb1edcefc573d9080b61f51d544687055e7e9f437e96b6b0bacf96acafffe8e2dfbe7bc869c6e28a7308758b0ac0bb639e018a186b875f2d8bde1753b0f2deaf807f39e6f96724869553b0f95d4dd3f42034cb7ec53bbe6b7fa684166cb720d155d74be61e4622e0895ebeb918c6fc136d400", 0xe0}, {&(0x7f00000002c0)="f41e155ac143329c65b04adb6ee2f34e463953c103f8eb5cf6b8537f51c565d8eecdd75504e9756a1820c6f5207ec7ec5566d415e3f28877318076a2b914b0aaa19860821c129d7ef2ee606a0a7ac5e3dd9fda87ed27b611c65ae20171b759ea07b8c6e827cfb6d198393128749b382f98af301f006c61558fa1845e7acdeea88947f013b64814e1d6113b1c6632d03a54df08a8", 0x94}, {&(0x7f0000000380)="5f687f5ec1c9b6b94401c34d6c3d12bcc60871a374f3c6a9d74e651ac74f517f361699ca069b2775af35dc0bb2d9b816ebe64d5d4f741ddcc89be5311240169d5e00bf21a9a3099b164407f40e565967d0279f7be31985ca6353041376fe189d5f34dd5c6d83cc12ed45a858701fb59646f52c7dcdd08fd5b954fd8e501ca4b35d25249902dd34d85c45efb3cc3f5c1df5039913de6c96fabd642198f1d6125b382490377e3f7a2e7edc5793829f5be79c8bc81b7c2b7e093a4719", 0xbb}, {&(0x7f0000000440)="9643186739b91b52440232721f514809aa7e1d54db362093324c0314275ff54da6cfaa0f83bf12ef4df5bef6aa06afd268cfca07bc867611b2c79c5d04752b0ffe3ab843a228fd3abd97b2f472f9e273935fb8f6de49019e52a67a5f5d96ad81ac2f553cce9a3f56766faf8ab33c159899edc61e0d28a5e5e0be081af89ecc5d01f0f52ff2ec428668b14f46be4f913c4e6557665d710e77a060d8a7c4be135f2c9ed0417c8664d7506f36cf5fb00de1c9179cee62d844290a698116edd8dfc9d061a1fc2e0d966e56484aab2dba6fc657b4e1481e2b8ca14dcb4ba5af44eedcd430fa35459d609658eab6a31c1b01323cdecd4639eeac3da15f91ade4ec7e6e30e7575ec29c1c580313fd595d73e889aa32a8c8b21528fe4593486bc6e15440f40675d6a75b88e5f90b3ad1ec7c63dec210e7cad679df90b73a4a24cac0eaa15adf014a7e5f408ac25c6835bd87923dac7c2ca6a40c3377ffa17552cffae7092aa42612d9dfbab9f83cae332545bd7c387ec88e6ef70eda8ea6075ebbd33d82f9ee7c67a26ca272d48848500b0b541572e2c7076a0e537457a3052f4f663621f8adcdd7c51e3bc530e5619cf530fb261bf2a642e5f17a2b8028bd9bea27005e60ff2e36b969746b9fba9f5d229fb197dfbb47ef597e82b44b1fe330dc40fa8564b5b4a169c7cf963c640f5399bd9b4844a5589ab128b6e560bc3ebbb7931919d09c13aba2a77279508fa53905550c340477dc83dc8f6dac2ebc67fae7ae908d3d0857cc62b4f25cd6a2d8371e9220b15dea090ee986c71fe0b6705b6add537639fa35780255b85abf3517a2b74d5f4589f76aca66fa8bbf93fda4815d03002880c4e4665fbf5e7879321494a41703918847f80149f973ed05fb50d6921b93644ce28d4c4e80e75ccf4d9cb1656aa6a552c4f639ee197d553a71e64dc5361a53502a26692f6749100b0a97772932d9c981b0a4ab20c6bc8d6caa45bf32a2b2a856712f75dc2447f19a2fb371d800c0994b271e3c5e5e4e5529a8d497fceffcb388d5eb39dc9c05ea659a65a2806d7d48eabc1c1212783e70f6150bd312ad1dc7e615e7d52115000755968b9d6cc475e3316c8a7583e6d17ce2d1a59212e41edd95a6740b9172fdc3f4796895b55675e8411e5076f8ef5540272247887c0d6ff5e158204fab491c200a975a8c776b10905407416e66ae925ab950e2fb8f36bb902ce0552c6782538ed2915602f5468caa5b298d967b88bda40bc19eda75f957f798fd1da05dd2de6cf83fcd3d53f5f9567533ad63c52e119e961a7167724f0c0185540e74992fa340b1a2a7a3d45874c7cf7cd1ca7663de48b2815c6671103c036da7c37d8bda7fb4c91bde6a05ef1feb261eff9d6debfed697a18e6e441583ba88c88fc1a801d123de71f8dfa351046f954fdc55482f115c8d6ac9b508b68f75f6b893e1304d3e6f5557b101040ed439b98d57ccc79b41802f133276c46c23d6e360a243def8527036812fc831c37cfe99dd95ce8a132749e2d8aa44d5afdcd99ef6bfba3dc78592a43775e1451755b39a39f2d178622f7cdd485211209185e02c67b2e316d827e3e95f89e7509c6abf08096431bcd42e814b3a8c3db086d3c9b3b3f5ef4b6ee49446e4f9bd6d96aab5e2a10c062625f2bf22689b371ba66c3251aaacafb87e89d0d4adbc29b4d29495f8ef1e756f24ee373d562404a6d480f58cb4e3318ad4db587bc615017e74a2c44b65a90d76fec885b01af1708599546bceb36a4e1e5447ce233353f3d9eabad67e7e027dda26560b94c4bebe16bea45499bbb80bbd913f1c6725e2f3e7e27f10259a64b4a7eddbab1a9a17e4a4b7b62aaae90234f00f8cdbb0e3840a7685056ffd019c01a22d4d7c190b192bb72e7704d38416716a8ffe8ce3487a2bb252f8c695ba08d1337c387ba7b00b878f63de3cc8820e13e7786a851369e6bed69674b74cb7dd36cae7550ab58ff19bcc6f7900667c15f5a4ba9823fbb4cf4194256e14e70329eddfa1af0cb78e6c75cadd8b8b0e02f1b8504246fc567cf512a32b37c0399219125e4bd84321b6a94c5f6f63c1764d1c86f7c2b3c1c893581a4a337fdc1e1a4b5fb94879e71a19a18bfad56c3ac2680607df556bc1c57d5845667fefc99f7b17307c30f3dee9959bc543e6eb402a8df39bad7e6708ad3b6793168a8574d16a862e6f9cdaf29ec38c530323e6edb8e917f08e27a2a4c6f8051cd4c3a2dc48aa866f1fefe5237d3e51c91ffa3f8d378cc2450273502bed12ebbd7cbc9d0c54afda5fa07beb8cf7adfe83e241c7ef7f299b381f71eb8dd359b10f95639c98c9204fd6af28f9999845dfab2bf96c5717effbbb2e1c588c8ce458225f486d12ddfb4b9f09cb037bfca5f9a4f170fe0d0ba7bd66b5643353442c70b28c209126c501d4691a80bf2345a88e16a4290c6328ec762feb862fc2a2ab9efae8ca2f6bcadb7fd85a2644fffc54d109a01efc328f130a96ce9eddc0cc13d60f21a48b4edcce6f2c2cd2148e2a60b473ebd2b140734b2bd0ae0500c78ca6be4f97d77ce42f490262c09cb5a45ed2400e6897801228b59b10034af455b9b3c50ac8a6e8315361f68eef57ad52bfb8688bb6282f7090b3f8a5c467be0957d0322bb4dad0bd0c3a0a9c6b587ee5f0acd0017b201037c80dbb97f0e09852b1d9a0e5656252ed8ae4dd4325fa1d0528ea3d56c64c8d4681cb5440e53c04a97d1c50563030686a59b4f09de97c987198a6100f51d74d4096f46db62e0758e6c477d1abf7e93794c71379f1e3eddfdb034fb4ff156b5c59a9d415bbe18405d38c2b6764ac18e0591b052241164190e45293476b6961ca95e8dfd02492f34a3fb3cc96662e0f33e435b801e9387daa944e3888a1ecad309951cd86bf6f72ce6a0b1f73589f2293ebd38c5d891c8748227e35f21ebffa99f2324ccffa25735e7e38b7ed8b41e7739e2c731455587c320e6e5a3fbfe034e0aa995968d6e35a1872d017fdcf0aa5f1ceeba7e375d5b746a89ef2967611a01afa4affd5b81ad2612c215740e78c0195e2a24e3c2a34cad336163d2ca4094b4f0ad6a2d46c6bc79fe3fe2d0711196928d6f0083b7430cb5f81e8cee670506fbea0f71bf9f21039a8868383638dcbefe3a1f071530e311a934f94c2fab3edbed9b7bd634c9862ce7bb334b55f4a63b204257af8aac4e4db1e9d196bd6925e1970f84816c0505d6ece1dc9aab6a7b3d774a890337ed9f0956e46e5ac7187d62d1c3e8bf31fb74d6cd1efc1bfeb15c17dd3f59a2636a03f2f96131399361881ab86bbd749bc490f4b4aeacd1d30dae8ee6663cdb1252a2069735bd309c08da93e1a03b2360ae2f3353dfe22456a61636b83bd78098595a8f7e842d3858ae9a1bce665191677917bd67fd24e5c422e4e8d844a434c629554d077bffe6166a97f0c14bd973e5f3f7528208ceadb48f44af17da26ccd30c3c3181a5e9c67b8be3a49d9b88ae9ae00dbeed4b7521bfa9a4a202ccbda01b7654b8e1f98335485dfaedc26acaeab0843efca6d442834a85f1540ab639b9ba6719380d4a39e720c2696f1f886f1cf388f00e8859bba69c206c3c783c9ad39b3aacdf6e066c3d9ba077e01180b9cfee9ade1487c32beb65868700ec1e35204e402a52c47d53e75be01801ed77cc9afe118254502223f7afee3306104a1c0f98ad38ba0309c7e14889a3cb3844e439ed6b81d6ba92727696fef9ddc2250bcb31f43609ec98b37abe6560e9405d58afec9f5087761f46247dd290c35a7b9f277a09319c4f9fd08407b0128e780b69713468809b34eaf77ececa890f3ab4031ab93b7bca7378ee62a9b28292b9c17fbd5a3131edb8bea759a36c3632b17c5606d5e84b7229672aae8910b3a651a77cbb0bad238acba40f0743b12e043bec8faebd63c0ec201838255d9b1ab644b82056f0712393263d2d0a683258fbfc7e98f2d43685a606a6d6aa0d9127682687ae4a62bc3e3767d63ea276786f661a3087cef0c1bc7749810f4b86946274ac57f479e9d47d120e07b8a9dc021b3854451757474c6f344e21c8e150d5cfca15a4db7814ae84259bdf94734bc3c71b15b1581c178c64e8cb28ed498f0461cb91bae44dc6b6caf318d8b4a22c0a8d3e289a0fbc09f09249e8a758d985f5ed593f07f03aec1b0df63afc61a391b64f08f4a4e68bd3d67f17c0e22b8387a96e7abf65d773c8e87edf9a659d3508bff94ace81420816a4c0a071e5e6f0083d87f4a9131dcd7ffd95a37f4e4cfed17df99beb05ec42d460ea2af6cb9a2571dba1ef50056075a2a4b652e4eec5fca4a23a32806b74f3533ca2b539100398964be6e697751d23d2d1f572f18bd89643b2432a24d437c9c0b7752030eb1b86f0615621d0e52b38532fbe534b8c0459d187e86d3ad601aee1031c7a5c37eed96c45712ab0b3521ad0474af78df9d86501cd123806a07866a2b18df22c081d3023c3a3d8abcf7136a6e590ecbbf70452c016154de9d6db229de1099f606cb01092341c6ab5f5350ddd9c54e27c0c9ef8b7b90c0d935b1798d814c510f002ddba2d3571774dd8ded3e755bd39ba4358c2827177309fbb211977fef25b785dd04baa79a939a817213e97673c36cfb80a64c29900d260383a87c6b199e5434fd254aef40c6197547710ab64fc2f15ee3a68fffaeadc93531029a11e7f39dbc3516faf3734f3f40028df34951a6b63e069a6f4cc7e9862ed7bf31c1e541eea1c3a61b7075894d1a18f3366f44230c43ff25f382e75821e6093d89c240bde7b83b161f4ec4e2d155b3cf210049642b77942471bc5316da959a6264155ed51ae64a3d5f6292538bfa4faeb22e0f8e5d86aaa83a88339ce09238e71f8636cea6dcb428ae7329ac195ee50b5070b03079729169c12bd7c60afdd5c7c4a3cc0930434edffde878311a27ec33c376c3a60f08486297de450873895e4f6604c4e8852978ce7d6e44d18eb73f8f7c032e20b242d000c5627b7d1c3a7c33b3f29b114de1891805abff24fda607326a2d4b7c4d1a4f3640aedfcf1167dd04af72a8ccd014171c2025e759a427ad6d9021ffe199f69086a2f9881f37546083f83f5458c415ae071e48cc117bb70aafbf0b1c1c35d371b0bdfa09343aacde46394512f38fc6e55643aea0dc5877ed6368d5276e0bd318066043f2ede989a5e903ec2c9df52cb11e882f2bbc8d2c67d890836d8eedd76fae78849535a1ce77ecba2980139c0e3e1aaf4feb50aa3345be191a6c6a86672151412cf9fc5a7978d31c813855f4f75f282d183e82d23f1e82cb395344e9cdc99ffbce0cf89c22ae575fdb55e66690dc4a9ed21ccfc56b9dc9bebf138fa7f56ea4d0dfc3226ffb6a686e8c9d24267e43d924062826dd6f8a5a0d7841c3d217d11594966bd959af1f94b4b67e5a7d7af6f10998c654ac9f541b7a0b46437006a040433798f055573844ed8047b66777fb4b2d3d8c23a1aa674afa6b02c15444bbfa31af55f315ff60871bd8a9705033f8bc9ffdc122a9811ee9fc89070452736c7456f15c6a128a79887550c9c42b41ea12fad392312dec1698325492e2dcfcc6216b4f19b2eb65eb989975c45b30b07d8a1eee0ee34fb9c2ae5cfe4d8d569b34329c96a70c37b370cf805ad85323c27d41a0050fcb520d499ad465e564cd881cd1e4812e18176ca282982a0e6d2b340b29018e2297f3ecd060856e6ab26d113916d3d16efd61fe52bc50f48eb96b5b1e1d17f98bdc805407bad91ebc1797b7e80505fbcd3324b2374ffdd982710620f7cffd0dc8850045e2", 0x1000}, {&(0x7f0000001440)="5d8e63c6dd8ed04fa13add0beeba203ff3cb6de8d41daf880826a895e6b4481ba0faf93778c1ada9bba95d1ede1b3c967c50a3dd5dc1a530d353991c31cab56654f68b9f69386b7fccd28a8686cd5ba455d8186a908c9a3d4b0092bff80aaa743163bbbcc78d0c82f3ca868d700ed887ad57f88a03e56937", 0x78}, {&(0x7f00000014c0)="f514aaa4b691fa2ea1613a852822488f2d00fbf36ef2dd533cf278e03d7300842416d8a5a7c9e4273bc8de8492f2f954f7f74c870003db907ea6a401103ebc457f44320605b8fc449ae384ad97c4c3666bd98a8a068106c1ab2be866be221930a7bc6cd7bc5f14218d", 0x69}], 0x7, &(0x7f00000015c0)=[{0x88, 0x10f, 0x8, "b10ff7df161d437e9f7342350288511e6c3fd0c0f39e090664a7ae9d41be605ec31e3f117b60ed1e66a57ad5ad7a33ce9ac1db8da5fd72aa782212fe5441e540c7793c119cc7d6d09819e878eb937d594e6775f2f25710092c02b8b1e58033c1d271829173d031d37872dfa201d8a2e7c6deb9aa"}, {0xf0, 0x38, 0xfff, "48019cb3853594be2a7793c97d30824d27e12d265d0037474acbcaad17fd84fb724551c0b148693ca8868bfead8c286e6cf425114ec2b116c41fe66a902aa119e2dfd8579f11f41ac229223018dea7ca60e8adc2250272bc7a137d28193588d793d8a2f5ddc87f0ecb59cca0773cc6b00f83d79ece4d655adc48f3a093fb89227741392bc8c4984c5b960c15c5cd2d97be49a04bfac181c0a1f951770f23b02912cbd45856e44dcfea8064f83725a108ed3af6dff9a59e884f2bcc29cdd872fefdd77f624117989509f44b503776c416ef5f6f5f44efff1f960a"}, {0x28, 0x84, 0xfffffffa, "62c2716bb1846099c240cb6d55aeb2d759"}, {0x38, 0x112, 0xb, "d15278b59e864203b352081400f62aebdefa742b656711c393c5943297d744b381965fc8"}, {0xf0, 0x0, 0x80000001, "d38bafe14d4b86b53c3a45840957015ad128b0ed9f5a45a4e04aad567968b14f71da6adb3c094955af2c1f37dbbc9539c48f8a0efcab2a94040a417e240ca37ab5e714956ebe05f30f507ee3791ce48f9437be9f7c53df5754313feaed1afb8dfd07c0e0cfc9d5d609a1165148cbd3e69303e483cfa859458407642b019a293130d3770041bda26fe81a2721640fe2011d0ec8a33f43b6946da524f34c09eae7af0cce5f785f5a16357c368053c0c7e3832f302f52e2f906843eb90f255a1cbca1e064a9ca724fe1d8112c590d14f60f662e313c57d4cc07457b"}, {0xf8, 0x111, 0x4, "ef408b6e1f5cec2b3e9c9259449260d1eccc3b6e93147c45aa156658aab635130a30fa527d8cb4f452531589a0b1455ab5127db4569404496a94492cf3acdfb8e269f4ea39553885c1f343fa500d8eef10d0c773cd43f69c675e0abc1bf1b5e80f34f27460cfb8587ba80816bf06a8c5ddd8faad799a4e2b70a18b5184ba490c612e69a3773a9cd0148e34de6cd55f60f2c4e498002bd12e2ff09534ce40c509854264d45901307e608a72bd0ad2c955c8c1cb6ec8b5bb9f5d2bbff184f4ad96f0a49d93dc6045b8efd62b6228e938972311acb6ad4192fb4e8157862c237b2bf1d3a2"}], 0x3c0}, 0x4001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000000)) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) 12:29:45 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030005000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 612.745348] FAULT_INJECTION: forcing a failure. [ 612.745348] name failslab, interval 1, probability 0, space 0, times 0 [ 612.769064] BTRFS error (device loop1): open_ctree failed [ 612.813622] CPU: 1 PID: 7411 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 612.821467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.830838] Call Trace: [ 612.833443] dump_stack+0x22c/0x33e [ 612.837102] should_fail.cold+0xa/0x2f [ 612.840996] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 612.846165] ? lock_acquire+0x170/0x3f0 [ 612.850164] __should_failslab+0x153/0x1b6 [ 612.854402] should_failslab+0x5/0xf [ 612.858117] kmem_cache_alloc+0x2b1/0x4a0 12:29:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 612.862272] ? __alloc_fd+0x2ab/0x590 [ 612.866090] ? shmem_destroy_callback+0xb0/0xb0 [ 612.870770] shmem_alloc_inode+0x18/0x40 [ 612.874856] ? shmem_destroy_callback+0xb0/0xb0 [ 612.879543] alloc_inode+0x5d/0x180 [ 612.883183] new_inode+0x1d/0xf0 [ 612.886565] shmem_get_inode+0x96/0x8d0 [ 612.890547] __shmem_file_setup.part.0+0x7a/0x2b0 [ 612.895398] shmem_file_setup+0x61/0x90 [ 612.899390] __se_sys_memfd_create+0x26b/0x440 [ 612.903998] ? memfd_file_seals_ptr+0x150/0x150 [ 612.908670] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 612.914041] ? trace_hardirqs_off_caller+0x6e/0x210 [ 612.919073] ? do_syscall_64+0x21/0x670 [ 612.923069] do_syscall_64+0xf9/0x670 [ 612.926889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.932087] RIP: 0033:0x45de59 [ 612.935289] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.954199] RSP: 002b:00007fa6989d6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 12:29:45 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0xbc881, 0x100) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) [ 612.961921] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 612.969200] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 612.976564] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 612.983840] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 612.991117] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 613.021529] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 613.050812] BTRFS info (device loop5): enabling free space tree 12:29:45 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xa9, 0x800) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r7, 0x8983, &(0x7f0000000040)={0x7, 'geneve1\x00', {0x8693}, 0x23c2}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:45 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 613.073615] BTRFS info (device loop5): using free space tree [ 613.086933] BTRFS info (device loop5): has skinny extents [ 613.127369] attempt to access beyond end of device [ 613.132353] loop5: rw=4096, want=2064, limit=267 [ 613.144496] BTRFS error (device loop5): failed to read chunk root 12:29:46 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r7, 0x4008f510, &(0x7f0000000040)=0xee) r8 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VT_RESIZE(r8, 0x5609, &(0x7f0000000000)={0x1000, 0x2, 0x6}) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000000c0)=""/167) 12:29:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 613.183941] BTRFS error (device loop5): open_ctree failed 12:29:46 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030006000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 613.235713] FAULT_INJECTION: forcing a failure. [ 613.235713] name failslab, interval 1, probability 0, space 0, times 0 [ 613.250447] CPU: 1 PID: 7474 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 613.258294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.267659] Call Trace: [ 613.270265] dump_stack+0x22c/0x33e [ 613.273909] should_fail.cold+0xa/0x2f [ 613.277930] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 613.283045] ? find_held_lock+0x2d/0x110 [ 613.287122] __should_failslab+0x153/0x1b6 [ 613.291454] should_failslab+0x5/0xf [ 613.295183] kmem_cache_alloc+0x2b1/0x4a0 [ 613.299352] selinux_inode_alloc_security+0xe6/0x2d0 [ 613.304735] security_inode_alloc+0x67/0xc0 [ 613.309075] inode_init_always+0x5a3/0xb70 [ 613.313671] alloc_inode+0x7a/0x180 [ 613.317427] new_inode+0x1d/0xf0 [ 613.320807] shmem_get_inode+0x96/0x8d0 [ 613.324801] __shmem_file_setup.part.0+0x7a/0x2b0 [ 613.329672] shmem_file_setup+0x61/0x90 [ 613.333774] __se_sys_memfd_create+0x26b/0x440 [ 613.338377] ? memfd_file_seals_ptr+0x150/0x150 [ 613.343059] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 613.348537] ? trace_hardirqs_off_caller+0x6e/0x210 [ 613.353562] ? do_syscall_64+0x21/0x670 [ 613.357621] do_syscall_64+0xf9/0x670 [ 613.361436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.366630] RIP: 0033:0x45de59 [ 613.369827] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 613.388730] RSP: 002b:00007fa6989d6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 613.396512] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 613.403778] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 613.411132] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 613.418393] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 613.425652] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:46 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 613.502433] BTRFS error (device loop1): superblock checksum mismatch [ 613.519012] BTRFS error (device loop1): open_ctree failed [ 613.530387] FAULT_INJECTION: forcing a failure. [ 613.530387] name failslab, interval 1, probability 0, space 0, times 0 [ 613.565107] CPU: 0 PID: 7489 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 613.572946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.585537] Call Trace: [ 613.588147] dump_stack+0x22c/0x33e [ 613.591796] should_fail.cold+0xa/0x2f [ 613.595702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 613.600817] ? lock_acquire+0x170/0x3f0 [ 613.604817] __should_failslab+0x153/0x1b6 [ 613.609061] should_failslab+0x5/0xf [ 613.612785] kmem_cache_alloc+0x2b1/0x4a0 [ 613.616945] __d_alloc+0x2b/0xa20 [ 613.620417] d_alloc_pseudo+0x19/0x70 [ 613.624233] alloc_file_pseudo+0xc6/0x250 [ 613.628394] ? alloc_file+0x510/0x510 [ 613.632207] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 613.637845] ? shmem_get_inode+0x44c/0x8d0 [ 613.642097] __shmem_file_setup.part.0+0x102/0x2b0 [ 613.647038] shmem_file_setup+0x61/0x90 [ 613.651288] __se_sys_memfd_create+0x26b/0x440 [ 613.655886] ? memfd_file_seals_ptr+0x150/0x150 [ 613.660569] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 613.665944] ? trace_hardirqs_off_caller+0x6e/0x210 [ 613.670979] ? do_syscall_64+0x21/0x670 [ 613.674970] do_syscall_64+0xf9/0x670 [ 613.678786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.683982] RIP: 0033:0x45de59 [ 613.687190] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 613.706273] RSP: 002b:00007fa6989d6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 12:29:46 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x3a) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000040), 0x4) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x49, 0x1, {0xa4, 0x3, 0x7}}, 0x14) r4 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$usbfs(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xad0, 0x28080) ioctl$USBDEVFS_DISCARDURB(r5, 0x550b, &(0x7f0000000140)=0xd2da) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r6, 0x0, 0xff02160) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/seq\x00', 0x200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r7, 0x408c5333, &(0x7f0000000200)={0x0, 0x80000000, 0x1, 'queue1\x00', 0x3}) write$sndseq(r7, &(0x7f0000000100), 0x0) dup3(r0, r6, 0x0) [ 613.713995] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 613.721274] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 613.728556] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 613.735832] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 613.743111] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:46 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0x0) dup3(r0, r4, 0x0) r5 = dup3(r0, r1, 0x0) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f0000000000)={0x20000723, 0x2}) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'rose0\x00'}) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000040)=0x6) 12:29:46 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 613.832059] BTRFS info (device loop5): enabling free space tree [ 613.843852] BTRFS info (device loop5): using free space tree [ 613.852972] BTRFS info (device loop5): has skinny extents 12:29:46 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030007000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 613.953239] FAULT_INJECTION: forcing a failure. [ 613.953239] name failslab, interval 1, probability 0, space 0, times 0 [ 613.965559] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 614.044083] attempt to access beyond end of device [ 614.049420] loop5: rw=4096, want=2064, limit=267 [ 614.052169] CPU: 0 PID: 7529 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 614.062194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.068059] BTRFS error (device loop5): failed to read chunk root [ 614.071634] Call Trace: [ 614.071658] dump_stack+0x22c/0x33e [ 614.071680] should_fail.cold+0xa/0x2f [ 614.071699] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 614.093118] ? lock_acquire+0x170/0x3f0 [ 614.097154] __should_failslab+0x153/0x1b6 [ 614.101410] should_failslab+0x5/0xf [ 614.105186] kmem_cache_alloc+0x2b1/0x4a0 [ 614.109340] __alloc_file+0x21/0x330 [ 614.113048] alloc_empty_file+0x6d/0x170 [ 614.117117] alloc_file+0x93/0x510 [ 614.120660] alloc_file_pseudo+0x165/0x250 [ 614.124880] ? alloc_file+0x510/0x510 [ 614.128664] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 614.134329] ? shmem_get_inode+0x44c/0x8d0 [ 614.138561] __shmem_file_setup.part.0+0x102/0x2b0 [ 614.143478] shmem_file_setup+0x61/0x90 [ 614.147454] __se_sys_memfd_create+0x26b/0x440 [ 614.152046] ? memfd_file_seals_ptr+0x150/0x150 [ 614.156718] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 614.162066] ? trace_hardirqs_off_caller+0x6e/0x210 [ 614.167081] ? do_syscall_64+0x21/0x670 [ 614.171053] do_syscall_64+0xf9/0x670 [ 614.174848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.180026] RIP: 0033:0x45de59 [ 614.183204] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.202292] RSP: 002b:00007fa6989d6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 614.210170] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 614.217434] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 614.224695] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 614.232061] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 12:29:47 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) r5 = dup3(r0, r4, 0x0) ioctl$SNDCTL_MIDI_PRETIME(r5, 0xc0046d00, &(0x7f0000000000)=0xb09e) 12:29:47 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r8, 0x28}, 0x10) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r9, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) r10 = creat(&(0x7f00000000c0)='./file0\x00', 0xc0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r10, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x98, r11, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xd62}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc8b9faa}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x8}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x10}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3064}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x40000}, 0x4004000) [ 614.239323] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:47 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 614.302626] BTRFS error (device loop5): open_ctree failed 12:29:47 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x121e41, 0x0) read$rfkill(r3, 0x0, 0xff02160) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSBRK(r6, 0x5427) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup2(r8, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/58}) r11 = socket(0x23, 0x5, 0x0) ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f00000001c0)={0x400, 0xff, "4cf1a2b1ec7974f276022e2b842ddfb87692cb5ce4cda939", {0x2, 0x4}, 0x20}) setsockopt$XDP_TX_RING(r11, 0x11b, 0x3, 0x0, 0x0) dup3(r11, r7, 0x0) [ 614.366563] FAULT_INJECTION: forcing a failure. [ 614.366563] name failslab, interval 1, probability 0, space 0, times 0 [ 614.380813] CPU: 1 PID: 7563 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 614.388740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.398102] Call Trace: [ 614.400706] dump_stack+0x22c/0x33e [ 614.404355] should_fail.cold+0xa/0x2f [ 614.408263] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 614.413377] ? lock_acquire+0x170/0x3f0 [ 614.417375] __should_failslab+0x153/0x1b6 [ 614.421608] should_failslab+0x5/0xf [ 614.425307] kmem_cache_alloc+0x2b1/0x4a0 [ 614.429476] selinux_file_alloc_security+0xe4/0x1c0 [ 614.434489] security_file_alloc+0x40/0x90 [ 614.438727] __alloc_file+0xc9/0x330 [ 614.442685] alloc_empty_file+0x6d/0x170 [ 614.446732] alloc_file+0x93/0x510 [ 614.450284] alloc_file_pseudo+0x165/0x250 [ 614.454519] ? alloc_file+0x510/0x510 [ 614.458321] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 614.463961] ? shmem_get_inode+0x44c/0x8d0 [ 614.468820] __shmem_file_setup.part.0+0x102/0x2b0 [ 614.473765] shmem_file_setup+0x61/0x90 [ 614.477757] __se_sys_memfd_create+0x26b/0x440 [ 614.482483] ? memfd_file_seals_ptr+0x150/0x150 [ 614.487162] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 614.493225] ? trace_hardirqs_off_caller+0x6e/0x210 [ 614.498245] ? do_syscall_64+0x21/0x670 [ 614.502337] do_syscall_64+0xf9/0x670 [ 614.506140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.511336] RIP: 0033:0x45de59 [ 614.514538] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.534272] RSP: 002b:00007fa6989d6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 614.542047] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 614.549327] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 614.556616] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 12:29:47 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x81) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000001, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r4, 0x8818564c, &(0x7f0000000400)) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8982, &(0x7f0000000040)={0x6, 'rose0\x00', {0x2}, 0x7}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r7, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) [ 614.563877] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 614.571136] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:47 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:47 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:47 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030009000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 614.698322] FAULT_INJECTION: forcing a failure. [ 614.698322] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 614.716845] BTRFS error (device loop1): superblock checksum mismatch [ 614.739837] BTRFS error (device loop1): open_ctree failed [ 614.744495] CPU: 1 PID: 7580 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 614.753211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.762571] Call Trace: [ 614.765177] dump_stack+0x22c/0x33e [ 614.769080] should_fail.cold+0xa/0x2f [ 614.772984] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 614.778113] __alloc_pages_nodemask+0x256/0x2a60 [ 614.782884] ? static_obj+0x50/0x50 [ 614.786519] ? mark_held_locks+0xf0/0xf0 [ 614.790589] ? __lock_acquire+0x6ec/0x3ff0 [ 614.794844] ? mark_held_locks+0xf0/0xf0 [ 614.798923] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 614.803777] ? __lock_acquire+0x6ec/0x3ff0 [ 614.808035] ? find_held_lock+0x2d/0x110 [ 614.817270] ? avc_has_perm_noaudit+0x1fd/0x3e0 [ 614.821955] ? lock_downgrade+0x750/0x750 [ 614.826111] ? lock_acquire+0x170/0x3f0 [ 614.830100] ? avc_has_perm_noaudit+0x9c/0x3e0 [ 614.834816] alloc_pages_vma+0xf2/0x800 12:29:47 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) splice(r0, &(0x7f0000000000)=0x77e3, 0xffffffffffffffff, &(0x7f0000000040)=0xdf, 0x7fffffff, 0x2) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:47 executing program 0: socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r5 = socket(0x23, 0x5, 0x0) ioctl$RTC_PLL_SET(r4, 0x40207012, &(0x7f0000000040)={0x200, 0x256, 0xfffff84d, 0x7641, 0x7ff, 0x4, 0x9}) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) r6 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, 0x0, 0x0) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) [ 614.838812] shmem_alloc_page+0x11c/0x1f0 [ 614.842974] ? shmem_swapin+0x220/0x220 [ 614.846976] ? percpu_counter_add_batch+0x126/0x180 [ 614.852004] ? __vm_enough_memory+0x316/0x690 [ 614.856516] shmem_alloc_and_acct_page+0x15a/0x880 [ 614.861460] shmem_getpage_gfp+0x4e9/0x3a70 [ 614.865799] ? current_time+0x6f/0x1c0 [ 614.869714] ? shmem_alloc_and_acct_page+0x880/0x880 [ 614.874832] ? iov_iter_fault_in_readable+0x25c/0x510 [ 614.880035] ? iov_iter_init+0x1d0/0x1d0 [ 614.884117] shmem_write_begin+0xff/0x1e0 12:29:47 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003000a000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 614.888286] generic_perform_write+0x1f8/0x4d0 [ 614.892895] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 614.897579] ? current_time+0x1c0/0x1c0 [ 614.901570] ? lock_acquire+0x170/0x3f0 [ 614.905561] __generic_file_write_iter+0x24b/0x610 [ 614.910509] generic_file_write_iter+0x3f8/0x729 [ 614.915300] __vfs_write+0x51b/0x770 [ 614.919059] ? kernel_read+0x110/0x110 [ 614.922979] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 614.928016] ? rcu_sync_lockdep_assert+0x99/0x100 [ 614.932861] ? __sb_start_write+0x194/0x350 [ 614.937864] vfs_write+0x1f3/0x540 [ 614.941583] __x64_sys_pwrite64+0x1f7/0x250 [ 614.945891] ? ksys_pwrite64+0x1a0/0x1a0 [ 614.950026] ? trace_hardirqs_off_caller+0x6e/0x210 [ 614.955042] ? do_syscall_64+0x21/0x670 [ 614.959015] do_syscall_64+0xf9/0x670 [ 614.962883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.968055] RIP: 0033:0x4179b7 [ 614.971260] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 614.990170] RSP: 002b:00007fa6989d6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 614.997864] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004179b7 [ 615.005131] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 615.013705] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 615.020965] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 615.028242] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 12:29:47 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:47 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) dup3(r0, r3, 0x0) [ 615.098268] BTRFS info (device loop5): enabling free space tree [ 615.123660] BTRFS info (device loop5): using free space tree 12:29:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:47 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 615.161635] BTRFS info (device loop5): has skinny extents [ 615.194536] attempt to access beyond end of device [ 615.200643] loop5: rw=4096, want=2064, limit=267 [ 615.230589] BTRFS error (device loop5): failed to read chunk root [ 615.258389] FAULT_INJECTION: forcing a failure. [ 615.258389] name failslab, interval 1, probability 0, space 0, times 0 [ 615.269703] CPU: 0 PID: 7649 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 615.277560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.286908] Call Trace: [ 615.289495] dump_stack+0x22c/0x33e [ 615.293111] should_fail.cold+0xa/0x2f [ 615.296985] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.302074] ? __lock_acquire+0x6ec/0x3ff0 [ 615.306299] __should_failslab+0x153/0x1b6 [ 615.310520] should_failslab+0x5/0xf [ 615.314218] kmem_cache_alloc+0x43/0x4a0 [ 615.318333] ? __lock_acquire+0x6ec/0x3ff0 [ 615.322653] radix_tree_node_alloc.constprop.0+0x1e4/0x390 [ 615.328354] __radix_tree_create+0x382/0x680 [ 615.332752] __radix_tree_insert+0xbb/0x660 [ 615.337064] ? __radix_tree_create+0x680/0x680 [ 615.343033] ? lock_acquire+0x170/0x3f0 [ 615.347001] ? shmem_add_to_page_cache+0x306/0xc80 [ 615.351924] shmem_add_to_page_cache+0x616/0xc80 [ 615.356684] ? shmem_recalc_inode+0x310/0x310 [ 615.361205] ? __radix_tree_preload+0x262/0x340 [ 615.365875] shmem_getpage_gfp+0x20b0/0x3a70 [ 615.370274] ? current_time+0x6f/0x1c0 [ 615.374165] ? shmem_alloc_and_acct_page+0x880/0x880 [ 615.379268] ? iov_iter_fault_in_readable+0x25c/0x510 [ 615.384454] ? iov_iter_init+0x1d0/0x1d0 [ 615.388514] shmem_write_begin+0xff/0x1e0 [ 615.392650] generic_perform_write+0x1f8/0x4d0 [ 615.397231] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 615.401901] ? current_time+0x1c0/0x1c0 [ 615.405862] ? lock_acquire+0x170/0x3f0 [ 615.409829] __generic_file_write_iter+0x24b/0x610 [ 615.414773] generic_file_write_iter+0x3f8/0x729 [ 615.419536] __vfs_write+0x51b/0x770 [ 615.423248] ? kernel_read+0x110/0x110 [ 615.427137] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 615.432150] ? rcu_sync_lockdep_assert+0x99/0x100 [ 615.436986] ? __sb_start_write+0x194/0x350 [ 615.441377] vfs_write+0x1f3/0x540 [ 615.444921] __x64_sys_pwrite64+0x1f7/0x250 [ 615.449227] ? ksys_pwrite64+0x1a0/0x1a0 [ 615.453285] ? trace_hardirqs_off_caller+0x6e/0x210 [ 615.458558] ? do_syscall_64+0x21/0x670 [ 615.462518] do_syscall_64+0xf9/0x670 [ 615.466353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.471527] RIP: 0033:0x4179b7 [ 615.474706] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 615.493786] RSP: 002b:00007fa6989d6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 615.501481] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004179b7 [ 615.508749] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 615.516040] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 615.523309] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 12:29:48 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) r5 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, @llc={0x1a, 0x339, 0x40, 0x7, 0x7f, 0x8, @random="ac00a0edc7b7"}, @vsock={0x28, 0x0, 0x0, @my=0x1}, @nl=@kern={0x10, 0x0, 0x0, 0x4000000}, 0x2, 0x0, 0x0, 0x0, 0x9ae, &(0x7f0000000000)='bond0\x00', 0x7, 0x71, 0x3df9}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$nl_sock_diag(0x10, 0x3, 0x4) inotify_init() r6 = socket$alg(0x26, 0x5, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r6, 0x4004f506, &(0x7f0000000180)) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r8, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r7, 0x0, 0x100000, 0x0) 12:29:48 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xc4, r5, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xa4c}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x200}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x242b}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x58}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x7fff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x80}, 0x8814) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:48 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003000c000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 615.530565] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 [ 615.567347] BTRFS error (device loop5): open_ctree failed 12:29:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 615.632067] BTRFS error (device loop1): superblock checksum mismatch 12:29:48 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:48 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) r4 = socket$l2tp6(0xa, 0x2, 0x73) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x3, @private0, 0x6}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) [ 615.688724] BTRFS error (device loop1): open_ctree failed [ 615.814565] f2fs_msg: 74 callbacks suppressed [ 615.814580] F2FS-fs (loop3): Invalid log sectors per block(786435) log sectorsize(9) [ 615.827197] BTRFS info (device loop5): enabling free space tree [ 615.827627] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 615.841096] F2FS-fs (loop3): Unable to read 2th superblock [ 615.846867] F2FS-fs (loop3): Invalid log sectors per block(786435) log sectorsize(9) [ 615.857261] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:29:48 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) r4 = syz_mount_image$vxfs(&(0x7f0000000000)='vxfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="1a4a12dfa2133a94c7eca8dba974a1dd37673dd86bff676e", 0x18, 0x40}, {&(0x7f0000000100)="04ab0c192deaa553aaafd473e8e5d1deb3c96e83278b7b330814ebed69555f8eae0869d95a8671484eea86d6c434664ab84995666c96646d8d782da858d96a51f945b9a5668111c9d504528642784b16", 0x50, 0x3}], 0x8010, &(0x7f0000000200)={[{'\'-&]&{.'}, {'{{\\\xf1\'{#-\\'}, {'{-'}], [{@seclabel='seclabel'}, {@dont_measure='dont_measure'}, {@obj_user={'obj_user', 0x3d, '^{:*{{-'}}, {@obj_user={'obj_user', 0x3d, '/dev/dsp\x00'}}, {@uid_eq={'uid'}}]}) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000280)={0x6f8280e3, 0xfffffffffffffe01, 0x2, 0x0, 0x0, [{{r2}, 0x7}, {{r4}, 0x3}]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) 12:29:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 615.863977] BTRFS info (device loop5): using free space tree [ 615.864806] F2FS-fs (loop3): Unable to read 2th superblock [ 615.882127] FAULT_INJECTION: forcing a failure. [ 615.882127] name failslab, interval 1, probability 0, space 0, times 0 [ 615.899347] BTRFS info (device loop5): has skinny extents [ 615.908801] CPU: 1 PID: 7690 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 615.916630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.926715] Call Trace: [ 615.929331] dump_stack+0x22c/0x33e [ 615.932979] should_fail.cold+0xa/0x2f [ 615.936883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.942014] ? lock_acquire+0x170/0x3f0 [ 615.946016] __should_failslab+0x153/0x1b6 [ 615.950267] should_failslab+0x5/0xf [ 615.953996] kmem_cache_alloc+0x2b1/0x4a0 [ 615.958215] getname_flags+0xce/0x590 [ 615.962031] do_sys_open+0x26c/0x520 [ 615.965759] ? filp_open+0x70/0x70 [ 615.969318] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 615.974694] ? trace_hardirqs_off_caller+0x6e/0x210 [ 615.979723] ? do_syscall_64+0x21/0x670 [ 615.983714] do_syscall_64+0xf9/0x670 [ 615.987536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.992732] RIP: 0033:0x417951 [ 615.995966] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 616.015658] RSP: 002b:00007fa6989d6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 616.023387] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 616.030693] RDX: 0000000000000048 RSI: 0000000000000002 RDI: 00007fa6989d6ae0 [ 616.037974] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 616.045255] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 616.052537] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 12:29:48 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003001f000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:48 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) fcntl$addseals(r3, 0x409, 0xe) ioctl$TIOCCONS(r7, 0x541d) ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000000)="7b9190dc2a011e44eaa8091c9ba3c279c7612f2757bdae0bfb897cb16fa18b608fcc7c4d94cd0dfd03a7fd0c7ff2eb50cbf5506972b7c762953402762a20c14907fa546f0b93bb") dup3(r0, r4, 0x0) 12:29:48 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 616.203648] FAULT_INJECTION: forcing a failure. [ 616.203648] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 616.215589] CPU: 0 PID: 7719 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 616.223397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.232783] Call Trace: [ 616.235388] dump_stack+0x22c/0x33e [ 616.239036] should_fail.cold+0xa/0x2f [ 616.242938] ? shmem_alloc_and_acct_page+0x880/0x880 [ 616.248314] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 616.253622] ? balance_dirty_pages_ratelimited+0x6fa/0x2070 [ 616.259345] ? page_mapping+0x281/0x4c0 [ 616.263332] ? __set_page_dirty_no_writeback+0x184/0x2b0 [ 616.268793] ? do_writepages+0x290/0x290 [ 616.272872] __alloc_pages_nodemask+0x256/0x2a60 [ 616.277661] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 616.282523] ? lock_downgrade+0x750/0x750 [ 616.286700] ? up_write+0x18/0x150 [ 616.290250] ? generic_file_write_iter+0x381/0x729 [ 616.295199] cache_grow_begin+0xa1/0x9b0 [ 616.299289] cache_alloc_refill+0x2aa/0x410 [ 616.303633] kmem_cache_alloc+0x3b4/0x4a0 [ 616.307796] getname_flags+0xce/0x590 [ 616.311607] do_sys_open+0x26c/0x520 [ 616.315421] ? filp_open+0x70/0x70 [ 616.318975] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 616.324372] ? trace_hardirqs_off_caller+0x6e/0x210 [ 616.329572] ? do_syscall_64+0x21/0x670 [ 616.333564] do_syscall_64+0xf9/0x670 [ 616.337387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.342612] RIP: 0033:0x417951 [ 616.345817] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 616.364952] RSP: 002b:00007fa6989d6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 616.372778] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 616.380038] RDX: 0000000000000048 RSI: 0000000000000002 RDI: 00007fa6989d6ae0 [ 616.388464] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 616.395725] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 12:29:49 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r3, 0x0, 0xff02160) dup3(r0, r3, 0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_SET_OP_GET_FNAME(r4, 0x1, 0x53, &(0x7f0000000000)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000000040)=0x2c) [ 616.403006] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 12:29:49 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:49 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/34, 0x22}, {&(0x7f0000000040)=""/1, 0x1}, {&(0x7f00000001c0)=""/197, 0xc5}], 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r5, 0x0, 0xff02160) dup3(r0, r5, 0x0) [ 616.452313] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 616.488412] F2FS-fs (loop3): Invalid log sectors per block(2031619) log sectorsize(9) [ 616.541354] attempt to access beyond end of device [ 616.546473] loop5: rw=4096, want=2064, limit=267 [ 616.558538] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 616.577775] F2FS-fs (loop3): Unable to read 2th superblock [ 616.585521] BTRFS error (device loop5): failed to read chunk root 12:29:49 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 616.619995] F2FS-fs (loop3): Invalid log sectors per block(2031619) log sectorsize(9) [ 616.668907] FAULT_INJECTION: forcing a failure. [ 616.668907] name failslab, interval 1, probability 0, space 0, times 0 [ 616.689272] BTRFS error (device loop5): open_ctree failed [ 616.693455] CPU: 0 PID: 7755 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 616.702653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.712017] Call Trace: [ 616.714620] dump_stack+0x22c/0x33e [ 616.718271] should_fail.cold+0xa/0x2f [ 616.722176] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 616.727297] ? lock_acquire+0x170/0x3f0 [ 616.731293] __should_failslab+0x153/0x1b6 [ 616.735542] should_failslab+0x5/0xf [ 616.739274] kmem_cache_alloc+0x2b1/0x4a0 [ 616.743433] ? __save_stack_trace+0x99/0x100 [ 616.747859] __alloc_file+0x21/0x330 [ 616.751585] alloc_empty_file+0x6d/0x170 [ 616.755656] path_openat+0x12b/0x2e90 [ 616.759470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.764851] ? path_lookupat+0x8d0/0x8d0 [ 616.768927] ? mark_held_locks+0xf0/0xf0 [ 616.773002] ? find_held_lock+0x2d/0x110 [ 616.777077] do_filp_open+0x18c/0x3f0 [ 616.780886] ? may_open_dev+0xf0/0xf0 [ 616.784694] ? find_held_lock+0x2d/0x110 [ 616.788760] ? __alloc_fd+0x2ab/0x590 [ 616.792573] ? lock_downgrade+0x750/0x750 [ 616.796723] ? lock_acquire+0x170/0x3f0 [ 616.800881] ? do_raw_spin_unlock+0x171/0x240 [ 616.805380] ? _raw_spin_unlock+0x29/0x40 [ 616.809533] ? __alloc_fd+0x2ab/0x590 [ 616.813348] do_sys_open+0x3b3/0x520 [ 616.817072] ? filp_open+0x70/0x70 [ 616.820621] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 616.825993] ? trace_hardirqs_off_caller+0x6e/0x210 [ 616.831018] ? do_syscall_64+0x21/0x670 [ 616.835007] do_syscall_64+0xf9/0x670 [ 616.838822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.844017] RIP: 0033:0x417951 [ 616.847214] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 616.866129] RSP: 002b:00007fa6989d6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 616.873850] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 616.881157] RDX: 0000000000000048 RSI: 0000000000000002 RDI: 00007fa6989d6ae0 [ 616.888524] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 616.895806] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 616.903079] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 12:29:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x4, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:49 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r3, 0x0) 12:29:49 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:49 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) r3 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, 0x0, 0x0) dup3(r0, r3, 0x0) 12:29:49 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030020000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 617.070160] BTRFS error (device loop1): superblock checksum mismatch [ 617.080154] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 617.100398] FAULT_INJECTION: forcing a failure. [ 617.100398] name failslab, interval 1, probability 0, space 0, times 0 [ 617.116418] CPU: 1 PID: 7780 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 617.124258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.134570] Call Trace: [ 617.137163] dump_stack+0x22c/0x33e [ 617.140792] should_fail.cold+0xa/0x2f [ 617.144665] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 617.149766] ? lock_acquire+0x170/0x3f0 [ 617.153904] __should_failslab+0x153/0x1b6 [ 617.158132] should_failslab+0x5/0xf [ 617.161831] kmem_cache_alloc+0x2b1/0x4a0 [ 617.165977] selinux_file_alloc_security+0xe4/0x1c0 [ 617.170997] security_file_alloc+0x40/0x90 [ 617.175247] __alloc_file+0xc9/0x330 [ 617.178975] alloc_empty_file+0x6d/0x170 [ 617.183038] path_openat+0x12b/0x2e90 [ 617.187216] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.192698] ? path_lookupat+0x8d0/0x8d0 [ 617.196783] ? mark_held_locks+0xf0/0xf0 [ 617.200925] ? find_held_lock+0x2d/0x110 [ 617.204973] do_filp_open+0x18c/0x3f0 [ 617.208767] ? may_open_dev+0xf0/0xf0 [ 617.212571] ? find_held_lock+0x2d/0x110 [ 617.216649] ? __alloc_fd+0x2ab/0x590 [ 617.220451] ? lock_downgrade+0x750/0x750 [ 617.224648] ? lock_acquire+0x170/0x3f0 [ 617.228746] ? do_raw_spin_unlock+0x171/0x240 [ 617.233241] ? _raw_spin_unlock+0x29/0x40 [ 617.237388] ? __alloc_fd+0x2ab/0x590 [ 617.241274] do_sys_open+0x3b3/0x520 [ 617.245004] ? filp_open+0x70/0x70 [ 617.248561] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 617.253933] ? trace_hardirqs_off_caller+0x6e/0x210 [ 617.258962] ? do_syscall_64+0x21/0x670 [ 617.263070] do_syscall_64+0xf9/0x670 [ 617.268180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.273364] RIP: 0033:0x417951 [ 617.276550] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 617.295460] RSP: 002b:00007fa6989d6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 617.304594] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 617.311877] RDX: 0000000000000048 RSI: 0000000000000002 RDI: 00007fa6989d6ae0 [ 617.319151] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 617.326417] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 617.333687] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 12:29:50 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r5, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x48, r6, 0x200, 0x70bd28, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xb}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast2}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4140) read$rfkill(r4, 0x0, 0xff02160) dup3(r0, r4, 0x0) 12:29:50 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x420040, 0x0) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000000)=""/48, &(0x7f0000000040)=0x30) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:50 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 617.379230] BTRFS error (device loop1): open_ctree failed 12:29:50 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030022000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88d", 0x12a, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:50 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0xff02160) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x8c000, 0x0) setsockopt$inet_buf(r5, 0x0, 0x2d, &(0x7f0000000040)="fd09006dfff0a8ced8cea2", 0xb) dup3(r0, r4, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f00000000c0)={0x2c, 0x1, 0x0, 0x4}, 0x10) [ 617.522900] FAULT_INJECTION: forcing a failure. [ 617.522900] name failslab, interval 1, probability 0, space 0, times 0 [ 617.554006] CPU: 1 PID: 7798 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 617.561849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.571215] Call Trace: [ 617.573824] dump_stack+0x22c/0x33e [ 617.577474] should_fail.cold+0xa/0x2f [ 617.581373] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 617.586497] __should_failslab+0x153/0x1b6 [ 617.590736] should_failslab+0x5/0xf [ 617.594444] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 617.599112] ? loop_info64_to_compat+0x5e0/0x5e0 [ 617.603881] ? loop_info64_to_compat+0x5e0/0x5e0 [ 617.608642] __kthread_create_on_node+0xd2/0x410 [ 617.613411] ? kthread_parkme+0xa0/0xa0 [ 617.617396] ? lo_ioctl+0x1bb/0x2200 [ 617.621127] ? __mutex_lock+0x3bd/0x13f0 [ 617.625197] ? lock_downgrade+0x750/0x750 [ 617.629363] ? loop_info64_to_compat+0x5e0/0x5e0 [ 617.634132] kthread_create_on_node+0xbb/0xf0 [ 617.638648] ? __kthread_create_on_node+0x410/0x410 [ 617.643688] ? __fget+0x3ad/0x570 [ 617.647159] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 617.651403] ? __lockdep_init_map+0x100/0x5c0 [ 617.655904] ? __lockdep_init_map+0x100/0x5c0 [ 617.660412] lo_ioctl+0xad3/0x2200 [ 617.663966] ? __kasan_slab_free+0x186/0x1f0 [ 617.668389] ? loop_set_status64+0x110/0x110 [ 617.672813] blkdev_ioctl+0x5cb/0x1a7e [ 617.676716] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.682092] ? blkpg_ioctl+0x9c0/0x9c0 [ 617.685995] ? mark_held_locks+0xf0/0xf0 [ 617.690077] ? find_held_lock+0x2d/0x110 [ 617.694156] ? debug_check_no_obj_freed+0x201/0x482 [ 617.699191] block_ioctl+0xe9/0x130 [ 617.702828] ? blkdev_fallocate+0x3f0/0x3f0 [ 617.707163] do_vfs_ioctl+0xcdb/0x12e0 [ 617.711063] ? selinux_file_ioctl+0x44f/0x5e0 [ 617.715564] ? ioctl_preallocate+0x200/0x200 [ 617.720015] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 617.725475] ? __fget+0x3ad/0x570 [ 617.728943] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 617.733187] ? putname+0xe1/0x130 [ 617.736660] ksys_ioctl+0x9b/0xc0 [ 617.740135] __x64_sys_ioctl+0x6f/0xb0 [ 617.744034] do_syscall_64+0xf9/0x670 [ 617.747850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.753050] RIP: 0033:0x45dcc7 [ 617.756228] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.775274] RSP: 002b:00007fa6989d6a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 617.782991] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 617.790258] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 617.797555] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 617.804832] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 617.812115] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 [ 617.875347] BTRFS info (device loop5): enabling free space tree [ 617.887444] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 617.920607] BTRFS info (device loop5): using free space tree [ 617.947877] BTRFS info (device loop5): has skinny extents [ 618.027007] BTRFS error (device loop5): open_ctree failed 12:29:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x5, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:50 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88d", 0x12a, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:50 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030023000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:50 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 618.156992] FAULT_INJECTION: forcing a failure. [ 618.156992] name failslab, interval 1, probability 0, space 0, times 0 [ 618.168892] CPU: 0 PID: 7846 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 618.176699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.186060] Call Trace: [ 618.188667] dump_stack+0x22c/0x33e [ 618.192317] should_fail.cold+0xa/0x2f [ 618.196232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 618.201363] __should_failslab+0x153/0x1b6 [ 618.202105] FAULT_INJECTION: forcing a failure. [ 618.202105] name failslab, interval 1, probability 0, space 0, times 0 [ 618.205609] should_failslab+0x5/0xf [ 618.220526] kmem_cache_alloc+0x2b1/0x4a0 [ 618.224674] __kernfs_new_node+0xd2/0x680 [ 618.228831] ? kernfs_find_ns+0x370/0x370 [ 618.233016] ? _raw_spin_unlock_irq+0x5a/0x90 [ 618.237511] ? __schedule+0x16bb/0x22e0 [ 618.241504] ? mark_held_locks+0xf0/0xf0 [ 618.245559] ? io_schedule_timeout+0x140/0x140 [ 618.250136] ? set_user_nice+0x2e3/0x670 [ 618.254191] kernfs_create_dir_ns+0x9e/0x230 [ 618.258596] internal_create_group+0x1c1/0xba0 [ 618.263200] ? sysfs_remove_link_from_group+0x70/0x70 [ 618.268381] ? lock_downgrade+0x750/0x750 [ 618.272542] lo_ioctl+0xf87/0x2200 [ 618.276079] ? loop_set_status64+0x110/0x110 [ 618.280482] blkdev_ioctl+0x5cb/0x1a7e [ 618.284382] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.289737] ? blkpg_ioctl+0x9c0/0x9c0 [ 618.293615] ? mark_held_locks+0xf0/0xf0 [ 618.297674] ? find_held_lock+0x2d/0x110 [ 618.301732] ? debug_check_no_obj_freed+0x201/0x482 [ 618.306747] block_ioctl+0xe9/0x130 [ 618.310365] ? blkdev_fallocate+0x3f0/0x3f0 [ 618.314679] do_vfs_ioctl+0xcdb/0x12e0 [ 618.318561] ? selinux_file_ioctl+0x44f/0x5e0 [ 618.323046] ? ioctl_preallocate+0x200/0x200 [ 618.327462] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 618.332905] ? __fget+0x3ad/0x570 [ 618.336355] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 618.340577] ? putname+0xe1/0x130 [ 618.344035] ksys_ioctl+0x9b/0xc0 [ 618.347495] __x64_sys_ioctl+0x6f/0xb0 [ 618.351396] do_syscall_64+0xf9/0x670 [ 618.355194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.360382] RIP: 0033:0x45dcc7 [ 618.363574] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.382473] RSP: 002b:00007fa6989d6a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 618.390176] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 618.397453] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 618.404725] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 618.412021] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 618.419368] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 [ 618.426647] CPU: 1 PID: 7856 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 618.434985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.444351] Call Trace: [ 618.446951] dump_stack+0x22c/0x33e [ 618.450593] should_fail.cold+0xa/0x2f 12:29:51 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024001d0f00"/20, @ANYRES32=r7, @ANYBLOB="4ca5f54147a72037583d761b01"], 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0x4, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006e80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0xa3, @local, 0x3ff}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000080)="d920a00bffa57fdffcdb680023123ec7b1f1fdf802edb25f03589941225514a2cd83518eba1799da96a8ee25f4032f", 0x2f}, {&(0x7f0000000140)="bde9d104f90f02f926e9976308380670546fec6c44d8df31072fa1e0828d631e2715dd6d00db723d457e7d07c5ce3d2025dceeff54ecc4fe8dff29e1249a6d8d59d4d0afd6119296c435457ecf0e94f26c92fd0b6b978b78c70612e16d74b4", 0x5f}, {&(0x7f0000000400)="3e59f5cf8a06584164fb5f4877974c6f90b9ffdd5db5c3181944a1689d2cea252d0c9a8a323cd84bbf851d40532a702f2c27e35dccbd0cfae547c3a4bde9fdbc6c736ebceea5b29d697cc66f3749aaab0d33bbc672123dc45d2e0221c8575c25ff67dd613db286607a2f76c1cf9d282e2a360bfb6b9660db3ca3e169d0be3edb6302d70066ced18e774d606d302d05d53aaee73528e922390a10cffb421c30c96c896f607fcb9ff70c91b02f99ea26759c495c009fa3f7bde984c4d298ffe14d640490077a960a958a59ec6e74e9e06dd798486dbd946423340459bc4c35ce39c2282592105204f2a9e68d36a39fa0f55f4105d7a474633fec0fbb654f8ab7c81405dbc77d32be2d9fe23d6d0cfb2e08b85d4e09a3287748f0b8c2a4701cba3f77b1ee3c432d0fd705c9136bf5cb9f7db92b667a0fb75855ef3aa2bb8d3b5cf35e530941d8f2c2308edf2ccd4b530cec99df659812b712c629843c3913471c4786ef62bff384f22cf488f6d8bd427102a37b5f6812daae75ac006b7d599b6cca5720b9c3888edcdfa035aedd9117d3a280d63035e606dd0606b7cd18c959483c650eb0e7d5dd1edd7309d377e5f99ac53a30a8b6fb3e9e475983415150ee50c8c09d410a25441c9060d8b39df2380be0f3e4e48ce3e3962da8c8209d6072e2e25b89f84cc657d6877948a7263f9dc388515b03bb3afe78f8f6d8df8a95618971f9585008d1cb5dfba2f447c1d5a3f9a43458debaf88462600d216fa08c34100b75b938c047e8a7f54fb58600c496f8a93fcb9db33ad12d39b9296381f84fa0702c8f3cf811d3ed9dd3bf4837aef9cd5afecaea95ba9ff9d511fb53e093f81c4b458faeef9f6af877c288cdb4d060b7ad0085cdbf75b69c0c7096f19305a8689f0e3d0691a5eb256efbc941bfa7c9ca98f13b7e86819489c22664d96cc78fd43f16ee931edb99a34682cd2604627304567021d522f912a17c0b752b9bce411e9a2c1891e669829f1977cf4410ef781d7affcb98ada0851f59334141845c31146ee3cae44b5bb4720d7b083651cb65481d9143bf2136e890e0974943ea426f673011c1bb8286daf6848aa6087974bbd626ba5659efacc888478067c6e0c1b7f15da9c4605850031aecb9f990e48a6da2e8a4be26f655ab0bdbfaa971d33692d0bbd2655eae063ec3d720476007219944ffb13266e16d7412d9ad8e2598c166c1e25fd99168c778cd98b74e6960dcc101d5a89398521817b3e82f852c3ed18ba02e5eefc111ed848ea2d68401e65fa42521cb74b81549fd4014a99d85cefb04bd28ecfb7d567943c417a1533125c0d47b6d1e7b87a5d6ee60cdcbbf063a4c7fbb8b45d2e1c8a6ec3e9604024de8de4044c2158b81a4c018f84b1ae34c9dab5b42759bb98f203b7d65bf8ee21fd29c2fd394451300cb5138ba78c5492100ab13a2ad2c412a94fe54c504ea6ac029e4dd35a161ba78b7c125224f08cbf85968c58496c3fc607e33c859e91f3305b919cc98e4418d51433ce630c2b5da97f0566d4ffd729c0bec4d2b328424a1cfb070fa1b2216d52098ad7f37b9b0ffd1f568aa0a3e58013a38adcb70b5cdf450fb3cba0af63a3d948aed2ad8daba27eff594edcc778ee154e03ac00d039eb685f1d4ca35e0fafca3fce21bbd47cc3906fa36ff1451b0076dc9e9369a13d4f1d533c7c85ebcf2d79037f67218d513f534c51ddd1fc0fccd6b270fce6522559873d69b042cbb101391567e43f9af2cf595539046e052001c1d268fe687f3155ba2f46775f433b1194010b4c5408c23684fe661706fe983d832dc64f57f3d45ec4d8373b06a12ce016324a69fd0d17a15068f6b037761baf3a0e139613e991e4ddce7d1854083625ba9010453228c2b61b862ea2d3a7caf25d8acf7aef4abcbec2c62569e8ae14031be41d4de0bcacd688c1220d82a2ce3d258a673a304c160b97946b13fd0c594b1f1e7003512f01d94d511b22d18b3bb9a96e58d071692d44a0b7a6237d57135b5d7a98c469b07ac0f89bc84a585074558aaa93ba6f2de8e2c4027937affc58417e9da3dfc1047a1f98a969a88abbe96843f58afc30ad0247c5510861fb2c854951f843fc3b794a782d645623c328aabd2247edb0ce6cf342edcf5f7b667abc7b8316623d0fb30919a299df8249ee02e2e70b95479dde1df558d10baddde8d650b7d08cac5c24afc4b279a032e3bafe4afc90a11e535d5d3c8fee4d0afc58ded3b9761fa31ac587c6bea884213fbdb3df17ce57f6a12b06f4a335491bdc27f8fb0f02ae5b226baf4edecd876f84cb7226bc6bc959ae2f5358e9170f0567a8ce65b8919cc95f30c8d5812e10c35d694c1f53025b05a1f3124224deede4b1159410cded3cbbecacc6d6b3a61e7b235480e41a225d5bfcbc0a97cc0fab69fc79bdc66f15828725fa2dd6022a9d29eb957c6bf4f96a6aeb2dd3cf2f4c651a57fe6fc2a0e2d82889ec5f71372eafd539641aaa9755a444cc6554b2d74ab0f971c2d874ece079a9954b2093a2913f50b0817b335811b9dbde3cf2266cdf06656e190b7bf65672b6d4ef0d7131aabedda9dda5bd1338dd72fe818e27022c29e2fea4cc37506484e0a9562cb691b8f2ab002c5a90a6127478125c2b41f5f52fe3747acf57d0231abbff63519be3195c501a74658c28c551f64ef6ba742705f88e00a1ab8868f6d5c656b5d0b3b1efc7368b7347f873dc27a0a2f11596a3fe3674cb938f06bf63478d2e74a92dc85371c19c7c17f1ab9d681c06996b89ace90ff7293757acc827704e1899828358ee1d2e0ccaa6d340c65fc2c33c05c57a7d3e8a3634d08b8a650ccb89ecf711103a7f369583a81930f9c35991b720f028ed522d3c4ccf7825302a0e0537264d4e9f850949e628632f80aad8c77e3df4a62bc8ef4d18c2f9c10bf17ad0585c8acfd687911157714f717152a363d726c2c24a0caa0a3f2707b5572508ec48f9ab9b584fed1ba961fe8f4e15535dac990a75e1245915bca7edb7184f742b2b75cdebc57779c1775db663656aa88a1d68aa6ceec72a38f0d52d6cb571be1afecb7cedd748ec490eeca8291a052923a3e25091feeac39f6a56f17e837f42763ac7d44f282f76228f72a6c51769f8a825695c63116f5df98577170449f88a77a5e83a47245884c2ab6e040881711e6d7bf27baa67f374c6db306f64ed8faef39c1186e38b309be37254239dd56aaeceac2f2bf00e1f305c399465f66db5aff6589de49637587571cd20d9aa728c16ba0fdee25cf9f9817307bc8778a217c0d2f554401f3355b474b984b7e33b66dc98b4277bd724e0df8f712a123249a9ec9fb3486df1722f461e24e9be6d599be17e30fbd0e64c41c1bff41e4eeef8f7aaae7e304babb531e4da90efffff70e42db12d41e2ace22ae582dcf3441cd62c3f97878eaa551bcc7107eeade8563a28703f9925cda917ca378115464d0cadfabe7f405a840994a9faefea0b0d03f30b919e918cbdc96f1ba3e0f1e742c9efc3595c09b14c65cf6179d25f11afdc66303781322a1f403fb259266e23c70ade47d7d44e2fa46b619e8ef80ec3a43b9c9e32a01922b58529f00c3f72791396e552891367d9e77f71cfabbc642b30035e79bc4961d23adda63e81bcc969e8f11ab094b04c8337d06a18064c29eb0d5dc864db0cd8bacebd5dcd8be945450f2cf006f0b99fc547b6566b8663278a5b1bf5933ba3c0b3614b439f5b82edad0eee8757a128948e4a607b559ba7d8573ddf89d1bf18dc72d67764948f0dad8ab10bf0ebb4861db811b924834c4d042c74c57f899006be5a50e461c5c6a03ee6534f7b4314b93944b115f904e5d0e303c59b2201585b185ad0653dedcfb797c7c215537736bd146f687340e8dd2b4ea84aa834884d66c4a42e3b3cf9aa6aa77c7e654e145b364cbf07e6892bfb6813165cd100077b8bc69ec1a356352de95f003237badf147d67ed61edb490228ba2194e2af0ddfabe8cb44d08eecfb931337b2f89fbe8f162219c295f262af12d1add727a72392e10a2c82d9fd3eeeed17c895ffaed7768671e6fae49fdf9b0fe4d78d2d4879ec59ce8cbc545d586b7bff79d80c8d1a5999431b559a8a3b90128a3b747817a9e11a10786db3469fcc8a3645fcfefe74aa4b46d2c8219cd19093882657dfc62cd8468ad899f46a9f412cd67165ebe6f6c19535f2c4bd313a7e3fb89fd43bceb6cb145b50a3b0d67bab4d9ff31e2ce82ccafc68b63f695a722c860a797c732f97128540ef70c5aae367bba1e92c510d4741fd4f57f0949f7ae0189189fc2b89dce53f45c0a582fa0b0ad00ae50230adbbe86bbe64aa8565d412517e45c0435334c7db5fa15b6d0f958711462e4e32dee5a39f47fd92a0c7a68a21852d35795ca337a339c40dc69118f516f50e1d850c24a0d7c4057239f3e52e6fda520c4fc8910177199c3f4c849fa292377510fb83710b22d66c04b371571431beb3790ef428deefb766c82ffe73575da829cb852421f5e6e343f67455c6048f29e61bd9854b2478d7f2be9efd749025e8d91826df35387243df53fe5a230573a57c23254519b0fea06c0778f626f3ac19898ebdb048c9555d40f7aa65303529d213d017c9041e57c4961db6b2a262065fb5893b81ebdf7360c10b020ddfa837fd6835834aa648ade3f56636b0fce4e306f7bdf4e0ba2878d490d2051249691901473fb450c24099f16b6bfd6441cf8bcefa66157ac7a099215529907c9d673bfccad9d17b63bc0fea89e04570614d34994c13895aa1569b6f2942765850cf76485adc2e8583dc5d40b11fa79d46c3c35fde7587fcb9d8d8f5f0ba1a9686c85db4cb57c008621cf3ee1a3d92a06deb276970ac19cd843f010979fcbb92ae85290b805073a8b702ff12661cf3b243b41c58bee5c9b1fbd2965fd1d75d7d988474fc750761a0cb8f06fe0033b057c59e05ed7d89b0409fb3f319f50691b487387de88d02a5669262d9cecaf43e4a32ba6b6fcf12ce8b744f642a8db7b9884236ea2cb69550685a326a4cf9b576a24e0b7fa962541b790c3b7da0a7b297712e3b9d83db328baaaccf84c97741a880be96090d1f7328e11abfa94f31d4c56f91c7da044b6d96ad8c4ce088911ad474e3580924281ce619bc600b66db1d80bf517adfbe96779c6640e19c5c14ac3d826221da5c4b8b89e96def9bc2eb36857caf9742082021c9bcc4943879515dcaaf1d970e8c03fe36a5ab0264f180bb05392a8e70549eea08bc042778c6173f8dd487c57b3728055c97498ec704849f0fd9e1b28e6e640dad5ab272eb339e1e5bfd202bbbe90d718ad2acee657303b3a5086bf75cb9678c7dd91f8f6a5ae12505040ce5e1a7b31226c75b78461cc53f49054ec1e3528aa9971ab0ec2657e82bb52d18681ec445dd7485a1cc7649a0f81099a8c2b1fbcc889a352a0adce9a720a8be64da54271198e3d474012cc4c121a6d8b6e8691cdd373c2cff72843f6ce88768d29726908d86ef828c00ada2949427b31c1b55725aac678d616a4300cd12ce7ca43581d67b8a57578eb8b52c2e19bf86eb7c22219cffdb4c2a07e1062de89bc64b3a663d6f369b905c5db68da3e1da67175994d965d5799962bbededd1c52c66865f27bc682844aa13a096a2088d97dea3fe0dd513578ae074a7cf78242c3d559da4126ce4ec0a67338b68dbeeb8b4e2c57de08741ce7aedefa0dc80b1955312f49360cd66805901192098e3569db7b38a35f061f727bbdeca5b8aac38b8f28db96a1aa237535a93ed474cf82f45a84eb18d6494cb", 0x1000}, {&(0x7f00000000c0)="15a8cb767c5150d638aeaf2f847dc83ae81d23d1f039d530f6e2c2e129b7ff75364dd0f6b8ff6bd8932157392eacc3b07b649c11f72670ca9fbcc4dd25ddef49", 0x40}, {&(0x7f00000001c0)="a7580a3776bf9bc4b8c7752673c8de0aebb36483fdb842b85c080735032612822d6ed79a7e1df5894294c4e1f60cd45712dbf3582c8e263eb1ab06e328dd3de647a87856bdbf207ebdf64cee", 0x4c}], 0x5, &(0x7f0000000300)=[@hopopts_2292={{0xa8, 0x29, 0x36, {0x29, 0x11, [], [@calipso={0x7, 0x58, {0x1, 0x14, 0x3b, 0x7f, [0x8, 0x5, 0x2, 0x20000000000, 0x8, 0x4, 0x3, 0x7, 0x8, 0x7fffffff]}}, @jumbo={0xc2, 0x4, 0x9}, @calipso={0x7, 0x20, {0x3, 0x6, 0x3c, 0x1000, [0xffffffffffff0001, 0x1, 0x100000000]}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xa760}}], 0xc0}}, {{&(0x7f0000001400)={0xa, 0x4e21, 0x3, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x401}, 0x1c, &(0x7f00000015c0)=[{&(0x7f0000001440)="95360104ba9a7674e2e3c6c7739da2bc843cac538932be810aba9a6390162a3feda068a4df397197914161ab507da4c8b20b5b22e8d80c69c9f4ebdba90552d6434f14b0506687116779d1f0e0689013c4fa635c2ac4b4b6cc389a8870298adf7adcd02b72d81592d8", 0x69}, {&(0x7f00000014c0)="4fa13e6eefdadacf29b2623c98488c5c1c3d41dc2bc50ecdfb76229ef7583cea6bffb01796a34a70f426541c1d69293e062db2f9a89c131f802b0eae6fb80011d6e1dd416323681d56dcc7215027fc1850fdbf34ef3dbac3153e86db8070f13433ad3c09843b899e2e7752b4bd6bba4de1986eb568a3ca6d08465af5b940804368cb0cfbcc647d344d4f2e62ce98140470086236cfa2aea8c816053a819db02e48b67829a24e288ebd24b419ac353d59b4bbe99aebcae5fa051796534cb039db7839e2a0bc3ef03edc8ee9a01c0f099c946ea176b8ebe08c19", 0xd9}], 0x2, &(0x7f0000001600)=[@hopopts_2292={{0x28, 0x29, 0x36, {0x1, 0x1, [], [@pad1, @enc_lim={0x4, 0x1, 0x9}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@local, r8}}}], 0x50}}, {{&(0x7f0000001680)={0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0x2d}, 0x2}, 0x1c, &(0x7f0000002900)=[{&(0x7f00000016c0)="9513e3a5ec6626a784d94b76488a6819b21271284d5d920985c1b29ff8e5360f720fbec025f63acc52a895dd3489b1ba4f20873fe9ac7df9228e743467418d6fbda5e5d81ca4d28029508fcc028bdb6fcef7e80b8fb2476187892e24f0401cfaf939e1acb4e7d5854d20c13ad1f271446c23cbd36d938fdd501cd9", 0x7b}, {&(0x7f0000001740)="76bd863fff7f7ca5cea8f7cb3b78fc11972a3e6ff46a50119483f82632ec74c966c9ddbaffe10609a038e60c09eca81094af6416ab891c9da6a6599a3f71b36a6feee442c4dd67ed06936f1abaca5619e072c09e358e17cd177074d60844f9038766ce4ada1c081c48f4a571c36b3cbadbcd7ccf9901a70818a7bdd0f9ac20fe9864655344cc3801b81a4b3f22c8c13af6334ac55759f6df44e9c28b6899f8aebdceeedb1ee6ff91fada49bd48c096d2c0621648163cc065b20954a445cb90353fbbd6d1920d307d1ff8b8ef0b72bc629f7f74ccd5bd5a76a20c02f194f4c161452467eda78355a96d1f20663a75d46e87", 0xf1}, {&(0x7f0000001840)="8fb81fedb30bd11c4da49cf0dff96c4cddff53b19c8a65428effc6254581f25686bace26b04521bb8cf8b720612239ee3f6f36f1d055f25e0d10c672c856b6c61c5d14ca2e0fc6a7148b04a6ef10f131b1583c45e4a63e353924f326c1c28f362a718574dff7604c456686f2ad0cbd1e875825f75b874dac", 0x78}, {&(0x7f00000018c0)="458597d19b98820ecd334bf294bec1b9043f4118f4774ec94b620053e4171cea1b550a1719de2b7b1b045ccff9ba6e57a8f83dfb", 0x34}, {&(0x7f0000001900)="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", 0x1000}], 0x5, &(0x7f0000002980)=[@dontfrag={{0x14, 0x29, 0x3e, 0x8000}}, @rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x7, 0x0, [@mcast2, @rand_addr=' \x01\x00']}}}, @tclass={{0x14, 0x29, 0x43, 0x7f}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x4, 0x2, [], [@enc_lim={0x4, 0x1, 0x3}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x9}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}, @rthdr_2292={{0xb8, 0x29, 0x39, {0x32, 0x14, 0x2, 0x5, 0x0, [@private0={0xfc, 0x0, [], 0x1}, @private2={0xfc, 0x2, [], 0x1}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1={0xfc, 0x1, [], 0x1}, @dev={0xfe, 0x80, [], 0x30}, @private1={0xfc, 0x1, [], 0x1}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private1={0xfc, 0x1, [], 0x1}, @ipv4={[], [], @private=0xa010102}, @rand_addr=' \x01\x00']}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x21, 0x0, [], [@padn={0x1, 0x1, [0x0]}]}}}, @dstopts={{0x118, 0x29, 0x37, {0x88, 0x1f, [], [@ra={0x5, 0x2, 0x7}, @ra={0x5, 0x2, 0x19}, @generic={0x1, 0xe7, "71b7c6adaeb1c28b3efd55d60159a1d3459c588ca70d22d5f93599bffa7c8f91e8dfa31b586c79e427086cf3ed8ee33167f8108e0ffde67d239c999d8ab237dd4aa53787be51327e881fe99574b52789107ab7cbfd782239ef5e0ede58717ed438a12ee49fcce0846cdad1ff70bb14fca3dfd9747ddb303fbf986256ae9d71ceff32e0d68b5362d25763def24343895dc040de7cadaf317b50e978defe6dfa480714817f9ca9dcca6bb172ffb40b905b65dba2f04aa487fa8ad1b76805394dffe41c782a7f645fdea3311f96ee025e81c5b52eaadda72b4c73aa2157062fdedde2d809161dcb4f"}, @jumbo={0xc2, 0x4, 0xfa1a}, @ra={0x5, 0x2, 0xfff}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x1000}}], 0x2a0}}, {{&(0x7f0000002c40)={0xa, 0x4e24, 0x66, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5a04673d}, 0x1c, &(0x7f0000002f80)=[{&(0x7f0000002c80)="d6b5678ee48400f97db85494d69b3fc52738837d8f0cb6771bbc9511f0f6f0be4bf7882f8be9d1f6e6d30bba32b57dcf2c250281306483b53e3a445bfa4214a3e3113d89b11d61caa420a532f1318be7550ddad10c6bac74b4313b3cc261ed0937765a07d1b9f004b71543d5f97ec2a32a181b6b83017a8946fec88799f84d54615ff2af0ed0507f76c765692adf89f519d3ba53218a7ef8f5bfb9774d727edc4945c83c8ed2c229da75d70bc3ff71d2cc803f0c9f3d3becf3cd85a88d56a4e67771def29a29766a014587e8905bffbd53", 0xd1}, {&(0x7f0000002d80)="48d793f103d38e2fc9ae3c90aad0ea10be8654c4af76b41b7b08d5bd5ba1145bdd8c57a3522c3f70c67f035f677f33eed18b47a702eef53899d90bda72347a8efc3c8e54260fdd8446d573f09c25b96e6b1189e16cc4da0780542b4bca35aaa96afed3ad890c718ca938ea8d5c1397ba47de133578c97842b0d1446d45b656d9e13dc56fec791adaccb12c0877e6f6ba7428c318ed985944a9b64e7bed68de531860c8edeb3539e06e960975db0863c1a20ac0ccbbc587e7702f6c027cea706c67d9cdc9a1afb7c4770837fb73ee0c5b81052a4bd8792b93494de339f046e9a71603509e591a35706e19ae", 0xeb}, {&(0x7f0000002e80)="7f72ed75c88e4ec624e9867f99e770d4321fd117d7259b7c9671616f596db79b92a86dc7733ccdcd3e40a2c86248200535c6b3afd0f84baa0085d2e40d0e0b5b8531d3070cbc0230cf708f5d6d05bee844e81d7c68eed24f629f5af1e03bb94f175298125a5aa3f22d9486b0a60529ff71c4f29319d354a196af7dc440f1ed7082da651910dc5c39d67377083eedeb8b8620e71bbbb7ccf6f61b7f", 0x9b}, {&(0x7f0000002f40)="23ad453a5ee2374227410df0760b775340fa6485c62b9fdfd582", 0x1a}], 0x4}}, {{&(0x7f0000002fc0)={0xa, 0x4e24, 0x9, @mcast2, 0x74c3}, 0x1c, &(0x7f0000004180)=[{&(0x7f0000003000)="0020812a85d2", 0x6}, {&(0x7f0000003040)="74218ac9a471e947e2a8f502f08d084ebf19c72e79de7c14b6eef536561ab04b4dbb61060808b49def2eee31bdd9275f06037367fe0f8d164dbde1d3d4fa46628440ef21964ded01e6c050ea64734172eeb333ecc069fb86458cb321a5ac8de842c49976d9aa6e23b5c48544b6da8e4b68256e0ef4008988d85dc63344e5779cdadf1293e76a345937f2fa5aae33c54d3b5f292b045d2d3122f742c24050d51410304b4657c94a09bc12b852829c9202cb5f66bcbd62099baa", 0xb9}, {&(0x7f0000003100)="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", 0x1000}, {&(0x7f0000004100)="315aadbaf834db5f26f5f7278cd9318da5860ad721660eba26de25d731c236926bd64e863bd0d138a31a3bf36af06df72d6b7320810e0686bd6887be56fab4e6e92d582cbd680805c7c1adda55fc9a7c8d53d6e8801142f940412fbc0058908c26283342cdbc2ff107426da0e89971ca87d6270daf", 0x75}], 0x4}}, {{0x0, 0x0, &(0x7f0000005680)=[{&(0x7f00000041c0)="bef2eb28c291af465f05fa7288f2fb87", 0x10}, {&(0x7f0000004200)="f40c4fc9226ba54c33a73602b76f914f96362ff1adbceec195c7921376a5e3d68384bc7b322c7601", 0x28}, {&(0x7f0000004240)="05d35b1137525291d808dc91d0eb4b0afbd056ff5421f23bc3ee0bb9ea28c194fd1d18ae63b99c7f58a9f7037e96ea002802d2f95dc63451fe57f6d779ee2d95026f4c0175ba257d5f5946f1932a1211aa4be28f1c40615ef040ceb6e1e8a0babd2eaf01bb6cc929479d3facca", 0x6d}, {&(0x7f00000042c0)="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", 0x1000}, {&(0x7f00000052c0)="c16f28bf94bd291906341c0c24989c348a7b8dc4aa1d8aadb480869e96a903f16e58703d0503599b7841644fa27efbff779beadb68b95ff11e45cb20dc9a9ddadafecd17a6f2fc6822f6f9caf81af65aeb5bebce7608e94a3ffddf8ac577ab834c0ca8e01dd60cdb6b0205ee52c88abda5e3f270edc6bd54d91db024ad383b97df75bf6d97577c03621621", 0x8b}, {&(0x7f0000005380)="9d213e5ba259cccfa7296e8f7ad8209f4bcc6c5569a0371dd6563b182eac9c762f96c78feca1efa60c179fa26b736f86db58ed227934ac8b94f67c95354e9e37732e803fca6d73ddab1ffbade12be3b1a345f2a0eed4fc71d8e53558d1d2d5d490d1ad28b31888d5b9357af7fc615072b6a98546a5d0be8414d7cc5125", 0x7d}, {&(0x7f0000005400)="54fbf714bacb405f589d129030b7496e5cd4996a8a998bef217c35332c5682c97f2f0ad39d79a17eabb78d02e941ce67efb4c09e0c5de284b8e6b819a364fe53a97136418e6755608a99bf0ce26f1506cd5c72282dc1194062ed3856dfb2e426bb2547a3789f823445499989ed28afe4470f483ed15cb784d49de3b8af5f64b137f2af044573ed17aca8e97e093b2f816aa5e023f84756c6d5f24a15f718a13e3c542e685ba3809454595f24202dbe7e47af0daa54430b74a563cc004e9f3fc19b46a96515f79865cf", 0xc9}, {&(0x7f0000005500)="18cd846b2000f84d87393bad8b2b87b1d483d792b0f622dc538d3322b1a0fa904e0b28f16a9538c7f8b048c3931b2804dadd41c8edce046e9d807f2e202d3fad20cf4ef587015ede7d77c77b7d37b5a56eb997d9c7f4fea3868ab83f3350aca50dd646e1f6c9385873c224b477140a59427b415db502366eb93d94409502802162779186de6ae05f0023247f7990cedb180608b13a58d800ecd8dfa4ed166dbef5755be7172a7eb7e07da3dbcfbe8afed88fa6aae4beaa321a39151776f2e2afd88cfa018c11f07c1beb66e97fce9fe249015526db5500cbf26e503f1114ef299f", 0xe1}, {&(0x7f0000005600)="c28960d648787a8d70bf5b641273f6493bed92ff1a420ac9c87f807c25fbd87a597bbc69d2ac4f156932ddd4a4e24b218c5f5b9ba65409e2d7f9ba028af522225e1d4c8c7d8baa0a78ecb829", 0x4c}], 0x9, &(0x7f0000005740)=ANY=[@ANYBLOB="140000000000000029000000430000000900e0962400000024000000000000002900000032000000ff0200000044efa249dcdaf394000001", @ANYRES32=0x0, @ANYBLOB="000000002400000000000000290000003200000020010000000000000000000000000002", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x002\x00'/36, @ANYRES32=0x0, @ANYBLOB="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"], 0x388}}, {{&(0x7f0000005b00)={0xa, 0x4e24, 0x8001, @dev={0xfe, 0x80, [], 0x2b}, 0x80000001}, 0x1c, &(0x7f0000006d00)=[{&(0x7f0000005b40)="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", 0x1000}, {&(0x7f0000006b40)="b1d9a120f4194c693f7a0e5c21ccbd35064924f49b5e1ddf5104e193d7855bb083e0ea18c6b91bd70090c36047a5c88034ef7574b181f6ca56f405c910080afc1f6d88aa8d4fe71d42b2a5d300fe4e052ec7c34382b8c8b6c7a0727995b8dfacfc7e6fb603869ccbe5d8b49cf1aaade764e79cc7152d211e4647e6d43580e87068aa587fbb3108dd077de37b1d9d086ab0f0559b3b38dee9ceee50bf863d24ae13a8400b3aa68ce910ed766fd9b5cc7bce20890f9662d9cf9efbb4b9ce54989bf21c75733975337860e36c0b8fa15074052012aea6ced4deed587387b7d6fc21bffd30326f91be", 0xe7}, {&(0x7f0000006c40)="cb56fd688772d9c345cf1fa03502613453865068af19966e4223069d7fe08ff674fa9687708c179809a9dec88df2e5f564ddf08661b0730394ef26f4965ff67d4e7725d26224b745caf6ea9c14cc99cc192bd079c42fdc35889962eb5ce32430d9faf82d473ba769a243440c", 0x6c}, {&(0x7f0000006cc0)="61bf437e785bd877761674d0c826be4a710fdb859e188c6b65cf089b545c", 0x1e}], 0x4, &(0x7f0000006d40)=[@dstopts_2292={{0x110, 0x29, 0x4, {0x8, 0x1e, [], [@ra={0x5, 0x2, 0x8}, @generic={0x14, 0xe6, "426ebbcd9884aa7a1b0fa4fe9fc77a84639d7f9087af7a8edaf725d6e606be2cf7bd6b96456f63b0e136a566afd60104526a69b2d789806e887465d22473f93e8280c1b9612ac40be94f54f0979213c6367492ca02648fca0cd6b640362763807b35c2dfd2d73a71dba5b2e4173f167b489bcc50b1380a5eec33e58d815add014ea149fdd0482c3390ba30734808e6d59a1f6256980ce59c85325115e93e7bc332ad1723a363de9c8f7678f329e6d23bf295663bddbdc36135bab15e31cf2f42fcdd52981d12d826b6793bac5314f8154889975d9176e0912cbee00f3cad61229b6ab1d2eda8"}, @generic={0x6a}, @jumbo={0xc2, 0x4, 0x200}]}}}], 0x110}}], 0x7, 0x0) [ 618.454582] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 618.459687] ? lock_acquire+0x170/0x3f0 [ 618.463651] __should_failslab+0x153/0x1b6 [ 618.467887] should_failslab+0x5/0xf [ 618.471611] __kmalloc+0x2dd/0x4f0 [ 618.475160] ? __se_sys_memfd_create+0xf8/0x440 [ 618.479847] __se_sys_memfd_create+0xf8/0x440 [ 618.484358] ? memfd_file_seals_ptr+0x150/0x150 [ 618.489049] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 618.494426] ? trace_hardirqs_off_caller+0x6e/0x210 [ 618.499456] ? do_syscall_64+0x21/0x670 [ 618.503460] do_syscall_64+0xf9/0x670 [ 618.507276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.512479] RIP: 0033:0x45de59 [ 618.515683] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.534597] RSP: 002b:00007f98c62b6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 618.542319] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 618.549588] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 618.556855] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 618.564116] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 618.571375] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:51 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003f226000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:51 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 618.644500] BTRFS error (device loop1): superblock checksum mismatch [ 618.683177] FAULT_INJECTION: forcing a failure. [ 618.683177] name failslab, interval 1, probability 0, space 0, times 0 12:29:51 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 618.696923] CPU: 1 PID: 7872 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 618.704746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.714111] Call Trace: [ 618.716720] dump_stack+0x22c/0x33e [ 618.720373] should_fail.cold+0xa/0x2f [ 618.724279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 618.729398] ? lock_acquire+0x170/0x3f0 [ 618.733431] __should_failslab+0x153/0x1b6 [ 618.737690] should_failslab+0x5/0xf [ 618.741419] kmem_cache_alloc+0x2b1/0x4a0 [ 618.745578] ? __alloc_fd+0x2ab/0x590 [ 618.749392] ? shmem_destroy_callback+0xb0/0xb0 [ 618.754085] shmem_alloc_inode+0x18/0x40 [ 618.758160] ? shmem_destroy_callback+0xb0/0xb0 [ 618.762929] alloc_inode+0x5d/0x180 [ 618.766569] new_inode+0x1d/0xf0 [ 618.769955] shmem_get_inode+0x96/0x8d0 [ 618.773955] __shmem_file_setup.part.0+0x7a/0x2b0 [ 618.778819] shmem_file_setup+0x61/0x90 [ 618.782811] __se_sys_memfd_create+0x26b/0x440 [ 618.787412] ? memfd_file_seals_ptr+0x150/0x150 [ 618.792095] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 618.797478] ? trace_hardirqs_off_caller+0x6e/0x210 [ 618.802510] ? do_syscall_64+0x21/0x670 [ 618.803656] FAULT_INJECTION: forcing a failure. [ 618.803656] name failslab, interval 1, probability 0, space 0, times 0 [ 618.806496] do_syscall_64+0xf9/0x670 [ 618.806520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.806533] RIP: 0033:0x45de59 [ 618.806546] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.806563] RSP: 002b:00007f98c62b6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 618.858829] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 618.866108] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 618.873378] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 618.880646] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 618.887919] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 618.895203] CPU: 0 PID: 7880 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 618.903008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.912362] Call Trace: [ 618.914957] dump_stack+0x22c/0x33e [ 618.918583] should_fail.cold+0xa/0x2f [ 618.922464] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 618.927569] __should_failslab+0x153/0x1b6 [ 618.931799] should_failslab+0x5/0xf [ 618.935505] kmem_cache_alloc+0x2b1/0x4a0 [ 618.939647] __kernfs_new_node+0xd2/0x680 [ 618.943795] ? kernfs_find_ns+0x370/0x370 [ 618.947936] ? kernfs_activate+0x2c/0x1d0 [ 618.952081] ? lock_downgrade+0x750/0x750 [ 618.956223] ? kernfs_add_one+0x51/0x4c0 [ 618.960295] ? ww_mutex_unlock+0x2f0/0x2f0 [ 618.964535] ? __mutex_unlock_slowpath+0xea/0x660 [ 618.969373] kernfs_new_node+0x92/0x120 [ 618.973343] __kernfs_create_file+0x51/0x33f [ 618.977749] sysfs_add_file_mode_ns+0x226/0x540 [ 618.982428] internal_create_group+0x355/0xba0 [ 618.987009] ? sysfs_remove_link_from_group+0x70/0x70 [ 618.992204] ? lock_downgrade+0x750/0x750 [ 618.996362] lo_ioctl+0xf87/0x2200 [ 618.999905] ? loop_set_status64+0x110/0x110 [ 619.004305] blkdev_ioctl+0x5cb/0x1a7e [ 619.008184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.013540] ? blkpg_ioctl+0x9c0/0x9c0 [ 619.017445] ? mark_held_locks+0xf0/0xf0 [ 619.021505] ? find_held_lock+0x2d/0x110 [ 619.025559] ? debug_check_no_obj_freed+0x201/0x482 [ 619.030578] block_ioctl+0xe9/0x130 [ 619.034204] ? blkdev_fallocate+0x3f0/0x3f0 [ 619.038522] do_vfs_ioctl+0xcdb/0x12e0 [ 619.042434] ? selinux_file_ioctl+0x44f/0x5e0 [ 619.046922] ? ioctl_preallocate+0x200/0x200 [ 619.051341] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 619.056786] ? __fget+0x3ad/0x570 [ 619.060241] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 619.064464] ? putname+0xe1/0x130 [ 619.067922] ksys_ioctl+0x9b/0xc0 [ 619.071369] __x64_sys_ioctl+0x6f/0xb0 [ 619.075258] do_syscall_64+0xf9/0x670 [ 619.079055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.084234] RIP: 0033:0x45dcc7 [ 619.087426] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 619.106337] RSP: 002b:00007fa6989d6a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 619.114045] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 619.121311] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 619.128576] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 619.135856] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 12:29:51 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 619.143137] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 [ 619.181253] FAULT_INJECTION: forcing a failure. [ 619.181253] name failslab, interval 1, probability 0, space 0, times 0 [ 619.195619] CPU: 1 PID: 7886 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 619.203454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.212820] Call Trace: [ 619.215425] dump_stack+0x22c/0x33e [ 619.219075] should_fail.cold+0xa/0x2f [ 619.222979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 619.228205] ? find_held_lock+0x2d/0x110 [ 619.232304] __should_failslab+0x153/0x1b6 [ 619.236539] should_failslab+0x5/0xf [ 619.240251] kmem_cache_alloc+0x2b1/0x4a0 [ 619.241440] BTRFS error (device loop1): open_ctree failed [ 619.244402] selinux_inode_alloc_security+0xe6/0x2d0 [ 619.255036] security_inode_alloc+0x67/0xc0 [ 619.259379] inode_init_always+0x5a3/0xb70 [ 619.263635] alloc_inode+0x7a/0x180 [ 619.267279] new_inode+0x1d/0xf0 [ 619.270655] shmem_get_inode+0x96/0x8d0 [ 619.271524] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 0 transid 0 /dev/loop4 [ 619.274640] __shmem_file_setup.part.0+0x7a/0x2b0 [ 619.290315] shmem_file_setup+0x61/0x90 [ 619.294314] __se_sys_memfd_create+0x26b/0x440 [ 619.298916] ? memfd_file_seals_ptr+0x150/0x150 [ 619.303598] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 619.308955] ? trace_hardirqs_off_caller+0x6e/0x210 [ 619.313963] ? do_syscall_64+0x21/0x670 [ 619.317931] do_syscall_64+0xf9/0x670 [ 619.321722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.326900] RIP: 0033:0x45de59 [ 619.330082] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 619.349012] RSP: 002b:00007f98c62b6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 619.356714] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 619.363976] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 619.371236] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 619.378496] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 619.385751] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 619.566197] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 619.583753] BTRFS error (device loop1): superblock checksum mismatch 12:29:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:52 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/user\x00') r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x280, 0x0) write$FUSE_NOTIFY_POLL(r7, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x90}}, 0x18) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:52 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88d", 0x12a, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:52 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003f626000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 619.671795] FAULT_INJECTION: forcing a failure. [ 619.671795] name failslab, interval 1, probability 0, space 0, times 0 [ 619.683674] CPU: 1 PID: 7906 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 619.691482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.700848] Call Trace: [ 619.703455] dump_stack+0x22c/0x33e [ 619.707108] should_fail.cold+0xa/0x2f [ 619.711039] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 619.716169] ? lock_acquire+0x170/0x3f0 [ 619.720164] __should_failslab+0x153/0x1b6 [ 619.724398] should_failslab+0x5/0xf [ 619.728104] kmem_cache_alloc+0x2b1/0x4a0 [ 619.732363] __d_alloc+0x2b/0xa20 [ 619.735815] d_alloc_pseudo+0x19/0x70 [ 619.739610] alloc_file_pseudo+0xc6/0x250 [ 619.743748] ? alloc_file+0x510/0x510 [ 619.747537] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 619.753150] ? shmem_get_inode+0x44c/0x8d0 [ 619.757382] __shmem_file_setup.part.0+0x102/0x2b0 [ 619.762302] shmem_file_setup+0x61/0x90 [ 619.766269] __se_sys_memfd_create+0x26b/0x440 [ 619.770844] ? memfd_file_seals_ptr+0x150/0x150 [ 619.775503] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 619.780855] ? trace_hardirqs_off_caller+0x6e/0x210 [ 619.785861] ? do_syscall_64+0x21/0x670 [ 619.789846] do_syscall_64+0xf9/0x670 [ 619.793640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.798817] RIP: 0033:0x45de59 [ 619.802000] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 619.820894] RSP: 002b:00007f98c62b6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 619.828678] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 619.835937] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 619.845476] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 619.852735] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 619.860008] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 619.877578] BTRFS error (device loop1): open_ctree failed 12:29:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:52 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 620.022504] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 620.042723] BTRFS info (device loop5): enabling free space tree [ 620.064617] BTRFS info (device loop5): using free space tree 12:29:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 620.075888] FAULT_INJECTION: forcing a failure. [ 620.075888] name failslab, interval 1, probability 0, space 0, times 0 [ 620.083656] BTRFS info (device loop5): has skinny extents [ 620.113904] CPU: 1 PID: 7933 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 620.121747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.131110] Call Trace: [ 620.133717] dump_stack+0x22c/0x33e [ 620.137369] should_fail.cold+0xa/0x2f [ 620.140384] attempt to access beyond end of device [ 620.141265] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 620.141282] ? lock_acquire+0x170/0x3f0 [ 620.141304] __should_failslab+0x153/0x1b6 [ 620.146217] loop5: rw=4096, want=2064, limit=267 [ 620.151303] should_failslab+0x5/0xf [ 620.151319] kmem_cache_alloc+0x2b1/0x4a0 [ 620.151401] __alloc_file+0x21/0x330 [ 620.151419] alloc_empty_file+0x6d/0x170 [ 620.168300] BTRFS error (device loop5): failed to read chunk root [ 620.172214] alloc_file+0x93/0x510 [ 620.172236] alloc_file_pseudo+0x165/0x250 [ 620.172252] ? alloc_file+0x510/0x510 [ 620.197799] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 620.203440] ? shmem_get_inode+0x44c/0x8d0 [ 620.207693] __shmem_file_setup.part.0+0x102/0x2b0 [ 620.212635] shmem_file_setup+0x61/0x90 [ 620.216623] __se_sys_memfd_create+0x26b/0x440 [ 620.221216] ? memfd_file_seals_ptr+0x150/0x150 [ 620.225927] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 620.231305] ? trace_hardirqs_off_caller+0x6e/0x210 [ 620.236336] ? do_syscall_64+0x21/0x670 [ 620.240327] do_syscall_64+0xf9/0x670 [ 620.244144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.249343] RIP: 0033:0x45de59 [ 620.252541] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:29:53 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003002c000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 620.271452] RSP: 002b:00007f98c62b6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 620.279177] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 620.286457] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 620.293734] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 620.301028] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 620.308304] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:53 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 620.424429] BTRFS error (device loop5): open_ctree failed [ 620.461709] FAULT_INJECTION: forcing a failure. [ 620.461709] name failslab, interval 1, probability 0, space 0, times 0 12:29:53 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x40}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='veth1_to_batadv\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) r7 = creat(&(0x7f0000000200)='./file0\x00', 0xc) splice(r0, 0x0, r7, 0x0, 0x200100004, 0x1) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_FLUSH(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x54, r8, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x48000}, 0x4) [ 620.473577] CPU: 0 PID: 7972 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 620.481393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.490755] Call Trace: [ 620.493364] dump_stack+0x22c/0x33e [ 620.497013] should_fail.cold+0xa/0x2f [ 620.500921] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 620.506040] ? lock_acquire+0x170/0x3f0 [ 620.510037] __should_failslab+0x153/0x1b6 [ 620.514276] should_failslab+0x5/0xf [ 620.518125] kmem_cache_alloc+0x2b1/0x4a0 [ 620.522282] selinux_file_alloc_security+0xe4/0x1c0 [ 620.527407] security_file_alloc+0x40/0x90 [ 620.531661] __alloc_file+0xc9/0x330 [ 620.535546] alloc_empty_file+0x6d/0x170 [ 620.539610] alloc_file+0x93/0x510 [ 620.543196] alloc_file_pseudo+0x165/0x250 [ 620.547418] ? alloc_file+0x510/0x510 [ 620.551209] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 620.556971] ? shmem_get_inode+0x44c/0x8d0 [ 620.561252] __shmem_file_setup.part.0+0x102/0x2b0 [ 620.566204] shmem_file_setup+0x61/0x90 [ 620.570196] __se_sys_memfd_create+0x26b/0x440 [ 620.574807] ? memfd_file_seals_ptr+0x150/0x150 [ 620.579492] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 620.584869] ? trace_hardirqs_off_caller+0x6e/0x210 [ 620.589898] ? do_syscall_64+0x21/0x670 [ 620.593890] do_syscall_64+0xf9/0x670 [ 620.597711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.602908] RIP: 0033:0x45de59 [ 620.606123] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 620.625036] RSP: 002b:00007f98c62b6a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 620.632760] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 620.640045] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 620.647325] RBP: 0000000000020000 R08: 0000000020000218 R09: 0000000000000000 [ 620.654608] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 620.661893] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:29:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x7, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:53 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 620.764512] FAULT_INJECTION: forcing a failure. [ 620.764512] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 620.782713] CPU: 1 PID: 7992 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 620.790550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.799913] Call Trace: [ 620.802521] dump_stack+0x22c/0x33e [ 620.806206] should_fail.cold+0xa/0x2f [ 620.810123] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 620.815250] __alloc_pages_nodemask+0x256/0x2a60 [ 620.820044] ? static_obj+0x50/0x50 [ 620.823660] ? mark_held_locks+0xf0/0xf0 [ 620.827712] ? __lock_acquire+0x6ec/0x3ff0 [ 620.831939] ? mark_held_locks+0xf0/0xf0 [ 620.835994] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 620.840841] ? __lock_acquire+0x6ec/0x3ff0 [ 620.845070] ? find_held_lock+0x2d/0x110 [ 620.849129] ? avc_has_perm_noaudit+0x1fd/0x3e0 [ 620.853792] ? lock_downgrade+0x750/0x750 [ 620.857952] ? lock_acquire+0x170/0x3f0 [ 620.861925] ? avc_has_perm_noaudit+0x9c/0x3e0 [ 620.866504] alloc_pages_vma+0xf2/0x800 [ 620.870480] shmem_alloc_page+0x11c/0x1f0 [ 620.874616] ? shmem_swapin+0x220/0x220 [ 620.878595] ? percpu_counter_add_batch+0x126/0x180 [ 620.883632] ? __vm_enough_memory+0x316/0x690 [ 620.888123] shmem_alloc_and_acct_page+0x15a/0x880 [ 620.893046] shmem_getpage_gfp+0x4e9/0x3a70 [ 620.897359] ? current_time+0x6f/0x1c0 [ 620.901238] ? shmem_alloc_and_acct_page+0x880/0x880 [ 620.906329] ? iov_iter_fault_in_readable+0x25c/0x510 [ 620.911508] ? iov_iter_init+0x1d0/0x1d0 [ 620.915559] shmem_write_begin+0xff/0x1e0 [ 620.919702] generic_perform_write+0x1f8/0x4d0 [ 620.924281] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 620.928938] ? current_time+0x1c0/0x1c0 [ 620.932902] ? lock_acquire+0x170/0x3f0 [ 620.936873] __generic_file_write_iter+0x24b/0x610 [ 620.941797] generic_file_write_iter+0x3f8/0x729 [ 620.946546] __vfs_write+0x51b/0x770 [ 620.950249] ? kernel_read+0x110/0x110 [ 620.954134] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 620.959138] ? rcu_sync_lockdep_assert+0x99/0x100 [ 620.963972] ? __sb_start_write+0x194/0x350 [ 620.968283] vfs_write+0x1f3/0x540 [ 620.971821] __x64_sys_pwrite64+0x1f7/0x250 [ 620.976135] ? ksys_pwrite64+0x1a0/0x1a0 [ 620.980188] ? trace_hardirqs_off_caller+0x6e/0x210 [ 620.987198] ? do_syscall_64+0x21/0x670 [ 620.991164] do_syscall_64+0xf9/0x670 [ 620.994957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.000134] RIP: 0033:0x4179b7 [ 621.003318] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 621.022213] RSP: 002b:00007f98c62b6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 621.029909] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004179b7 [ 621.037172] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 621.044432] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 621.051688] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 621.058962] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 12:29:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:53 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 621.153055] FAULT_INJECTION: forcing a failure. [ 621.153055] name failslab, interval 1, probability 0, space 0, times 0 [ 621.164314] CPU: 0 PID: 8004 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 621.172120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.181490] Call Trace: [ 621.184100] dump_stack+0x22c/0x33e [ 621.187750] should_fail.cold+0xa/0x2f [ 621.191658] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 621.196776] ? __lock_acquire+0x6ec/0x3ff0 [ 621.201028] __should_failslab+0x153/0x1b6 [ 621.205276] should_failslab+0x5/0xf [ 621.209004] kmem_cache_alloc+0x43/0x4a0 [ 621.213074] ? __lock_acquire+0x6ec/0x3ff0 [ 621.217322] radix_tree_node_alloc.constprop.0+0x1e4/0x390 [ 621.222961] __radix_tree_create+0x382/0x680 [ 621.227401] __radix_tree_insert+0xbb/0x660 [ 621.231737] ? __radix_tree_create+0x680/0x680 [ 621.236330] ? lock_acquire+0x170/0x3f0 [ 621.240315] ? shmem_add_to_page_cache+0x306/0xc80 [ 621.245263] shmem_add_to_page_cache+0x616/0xc80 [ 621.250035] ? shmem_recalc_inode+0x310/0x310 [ 621.254551] ? __radix_tree_preload+0x262/0x340 [ 621.259239] shmem_getpage_gfp+0x20b0/0x3a70 [ 621.263662] ? current_time+0x6f/0x1c0 [ 621.267567] ? shmem_alloc_and_acct_page+0x880/0x880 [ 621.272684] ? iov_iter_fault_in_readable+0x25c/0x510 [ 621.277891] ? iov_iter_init+0x1d0/0x1d0 [ 621.282056] shmem_write_begin+0xff/0x1e0 [ 621.286224] generic_perform_write+0x1f8/0x4d0 [ 621.290827] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 621.295514] ? current_time+0x1c0/0x1c0 [ 621.299503] ? lock_acquire+0x170/0x3f0 [ 621.303495] __generic_file_write_iter+0x24b/0x610 [ 621.308441] generic_file_write_iter+0x3f8/0x729 [ 621.313213] __vfs_write+0x51b/0x770 [ 621.316935] ? kernel_read+0x110/0x110 [ 621.320843] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 621.325872] ? rcu_sync_lockdep_assert+0x99/0x100 [ 621.330725] ? __sb_start_write+0x194/0x350 [ 621.335054] vfs_write+0x1f3/0x540 [ 621.338605] __x64_sys_pwrite64+0x1f7/0x250 [ 621.342942] ? ksys_pwrite64+0x1a0/0x1a0 [ 621.347034] ? trace_hardirqs_off_caller+0x6e/0x210 12:29:54 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_ATTR(r4, &(0x7f0000000000)={0x78, 0xfffffffffffffffe, 0x0, {0x8, 0xf20, 0x0, {0x6, 0x7fff, 0xc322, 0x9, 0x3, 0x7f, 0x1, 0x9183, 0x9, 0x8000, 0x20, 0xffffffffffffffff, 0x0, 0x1, 0x6}}}, 0x78) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) [ 621.352064] ? do_syscall_64+0x21/0x670 [ 621.356053] do_syscall_64+0xf9/0x670 [ 621.359866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.365059] RIP: 0033:0x4179b7 [ 621.368261] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 621.387171] RSP: 002b:00007f98c62b6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 621.394886] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004179b7 12:29:54 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003003f000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 621.402147] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 621.409413] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 621.416680] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 621.423941] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 12:29:54 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 621.508352] BTRFS info (device loop5): enabling free space tree [ 621.514563] BTRFS info (device loop5): using free space tree [ 621.530655] BTRFS info (device loop5): has skinny extents [ 621.572511] FAULT_INJECTION: forcing a failure. [ 621.572511] name failslab, interval 1, probability 0, space 0, times 0 [ 621.577810] attempt to access beyond end of device [ 621.584809] CPU: 1 PID: 8029 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 621.594349] loop5: rw=4096, want=2064, limit=267 [ 621.596459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.596466] Call Trace: [ 621.596486] dump_stack+0x22c/0x33e [ 621.596507] should_fail.cold+0xa/0x2f [ 621.596525] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 621.596540] ? lock_acquire+0x170/0x3f0 [ 621.596566] __should_failslab+0x153/0x1b6 [ 621.605861] BTRFS error (device loop5): failed to read chunk root [ 621.610664] should_failslab+0x5/0xf [ 621.610682] kmem_cache_alloc+0x2b1/0x4a0 [ 621.610703] getname_flags+0xce/0x590 [ 621.610720] do_sys_open+0x26c/0x520 [ 621.610735] ? filp_open+0x70/0x70 [ 621.610755] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 621.610771] ? trace_hardirqs_off_caller+0x6e/0x210 [ 621.610791] ? do_syscall_64+0x21/0x670 [ 621.610809] do_syscall_64+0xf9/0x670 [ 621.679094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.684294] RIP: 0033:0x417951 [ 621.687500] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 621.706415] RSP: 002b:00007f98c62b6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 621.714253] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 621.721533] RDX: 0000000000000048 RSI: 0000000000000002 RDI: 00007f98c62b6ae0 [ 621.728815] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 621.736100] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 621.743381] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 12:29:54 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 621.787229] BTRFS error (device loop5): open_ctree failed [ 621.793028] f2fs_msg: 63 callbacks suppressed [ 621.793043] F2FS-fs (loop3): Invalid log sectors per block(4128771) log sectorsize(9) [ 621.824323] BTRFS info (device loop5): disk space caching is enabled [ 621.837170] BTRFS info (device loop5): has skinny extents 12:29:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 621.878638] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 621.900289] F2FS-fs (loop3): Unable to read 2th superblock [ 621.919021] FAULT_INJECTION: forcing a failure. [ 621.919021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 621.930868] CPU: 0 PID: 8057 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 621.938675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.940203] F2FS-fs (loop3): Invalid log sectors per block(4128771) log sectorsize(9) [ 621.948036] Call Trace: [ 621.948062] dump_stack+0x22c/0x33e [ 621.948084] should_fail.cold+0xa/0x2f [ 621.948100] ? shmem_alloc_and_acct_page+0x880/0x880 [ 621.948116] ? fault_create_debugfs_attr+0x1e0/0x1e0 12:29:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x9, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 621.948130] ? balance_dirty_pages_ratelimited+0x6fa/0x2070 [ 621.948142] ? page_mapping+0x281/0x4c0 [ 621.948155] ? __set_page_dirty_no_writeback+0x184/0x2b0 [ 621.948170] ? do_writepages+0x290/0x290 [ 621.961540] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 621.962323] __alloc_pages_nodemask+0x256/0x2a60 [ 621.968655] F2FS-fs (loop3): Unable to read 2th superblock [ 621.971304] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 621.971323] ? lock_downgrade+0x750/0x750 [ 621.971344] ? up_write+0x18/0x150 [ 622.025927] ? generic_file_write_iter+0x381/0x729 [ 622.030853] cache_grow_begin+0xa1/0x9b0 [ 622.034910] cache_alloc_refill+0x2aa/0x410 [ 622.039225] kmem_cache_alloc+0x3b4/0x4a0 [ 622.043369] getname_flags+0xce/0x590 [ 622.047158] do_sys_open+0x26c/0x520 [ 622.050857] ? filp_open+0x70/0x70 [ 622.054386] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 622.059738] ? trace_hardirqs_off_caller+0x6e/0x210 [ 622.064742] ? do_syscall_64+0x21/0x670 [ 622.068711] do_syscall_64+0xf9/0x670 [ 622.072502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.077677] RIP: 0033:0x417951 [ 622.080876] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 622.099765] RSP: 002b:00007f98c62b6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 622.107460] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 622.114716] RDX: 0000000000000048 RSI: 0000000000000002 RDI: 00007f98c62b6ae0 [ 622.121994] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 622.129256] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 622.136512] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 [ 622.206247] F2FS-fs (loop3): Invalid log sectors per block(4128771) log sectorsize(9) [ 622.221658] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:29:55 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 622.253800] F2FS-fs (loop3): Unable to read 2th superblock [ 622.311712] F2FS-fs (loop3): Invalid log sectors per block(4128771) log sectorsize(9) [ 622.347751] attempt to access beyond end of device [ 622.348314] FAULT_INJECTION: forcing a failure. [ 622.348314] name failslab, interval 1, probability 0, space 0, times 0 [ 622.352710] loop5: rw=4096, want=2064, limit=267 [ 622.373240] BTRFS error (device loop5): failed to read chunk root 12:29:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x10, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:55 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030040000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {0x0}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 622.444530] CPU: 0 PID: 8090 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 622.452404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.461770] Call Trace: [ 622.464374] dump_stack+0x22c/0x33e [ 622.468016] should_fail.cold+0xa/0x2f [ 622.471996] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 622.477208] ? lock_acquire+0x170/0x3f0 [ 622.481183] __should_failslab+0x153/0x1b6 [ 622.485690] should_failslab+0x5/0xf [ 622.489402] kmem_cache_alloc+0x2b1/0x4a0 [ 622.493545] ? __save_stack_trace+0x99/0x100 [ 622.497960] __alloc_file+0x21/0x330 [ 622.501674] alloc_empty_file+0x6d/0x170 [ 622.505722] path_openat+0x12b/0x2e90 [ 622.509508] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.514855] ? path_lookupat+0x8d0/0x8d0 [ 622.518901] ? mark_held_locks+0xf0/0xf0 [ 622.522943] ? find_held_lock+0x2d/0x110 [ 622.526986] do_filp_open+0x18c/0x3f0 [ 622.530767] ? may_open_dev+0xf0/0xf0 [ 622.534556] ? find_held_lock+0x2d/0x110 [ 622.538598] ? __alloc_fd+0x2ab/0x590 [ 622.542390] ? lock_downgrade+0x750/0x750 [ 622.546515] ? lock_acquire+0x170/0x3f0 [ 622.550471] ? do_raw_spin_unlock+0x171/0x240 [ 622.556163] ? _raw_spin_unlock+0x29/0x40 [ 622.560290] ? __alloc_fd+0x2ab/0x590 [ 622.564075] do_sys_open+0x3b3/0x520 [ 622.567772] ? filp_open+0x70/0x70 [ 622.571301] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 622.576643] ? trace_hardirqs_off_caller+0x6e/0x210 [ 622.581680] ? do_syscall_64+0x21/0x670 [ 622.585667] do_syscall_64+0xf9/0x670 [ 622.589455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.594634] RIP: 0033:0x417951 [ 622.597807] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 622.617123] RSP: 002b:00007f98c62b6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 622.624815] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 622.632423] RDX: 0000000000000048 RSI: 0000000000000002 RDI: 00007f98c62b6ae0 [ 622.639671] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 622.646921] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 622.654169] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 12:29:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:55 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) ioctl$CHAR_RAW_PG(r0, 0x1269, &(0x7f0000000140)={0x5, 0x12b887fb, 0x36, &(0x7f00000000c0)="6047b8d6098e6590d6d9b3ed103dba7a91ae53e6a2680043ab5142425a943b183bed2795438b37e48f058645f356379e583dea0c0f5d"}) r7 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x81]}, 0x8) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 12:29:55 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 622.737648] BTRFS error (device loop5): open_ctree failed [ 622.862544] FAULT_INJECTION: forcing a failure. [ 622.862544] name failslab, interval 1, probability 0, space 0, times 0 [ 622.876896] BTRFS info (device loop5): enabling free space tree [ 622.881719] CPU: 0 PID: 8121 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 622.890212] BTRFS info (device loop5): using free space tree [ 622.890753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.890759] Call Trace: [ 622.890779] dump_stack+0x22c/0x33e [ 622.890799] should_fail.cold+0xa/0x2f [ 622.902744] BTRFS info (device loop5): has skinny extents [ 622.905942] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 622.905967] __should_failslab+0x153/0x1b6 [ 622.918018] attempt to access beyond end of device [ 622.921548] should_failslab+0x5/0xf [ 622.921567] kmem_cache_alloc+0x2b1/0x4a0 [ 622.926765] loop5: rw=4096, want=2064, limit=267 [ 622.930877] __d_alloc+0x2b/0xa20 [ 622.930898] d_alloc+0x4a/0x230 [ 622.935953] BTRFS error (device loop5): failed to read chunk root [ 622.939505] d_alloc_parallel+0xeb/0x1b70 [ 622.939534] ? check_preemption_disabled+0x41/0x2b0 [ 622.939552] ? __d_lookup_rcu+0x6f0/0x6f0 [ 622.939570] ? __d_lookup+0x489/0x790 [ 622.978407] ? d_lookup+0x1aa/0x280 [ 622.982027] ? d_lookup+0x18e/0x280 [ 622.985669] lookup_open+0x4da/0x19c0 [ 622.989461] ? debug_mutex_wake_waiter+0x380/0x3e0 [ 622.994380] ? may_open+0x360/0x360 [ 622.998005] ? path_openat+0x1863/0x2e90 [ 623.002060] path_openat+0x187b/0x2e90 [ 623.005942] ? path_lookupat+0x8d0/0x8d0 [ 623.009991] ? mark_held_locks+0xf0/0xf0 [ 623.014038] ? mark_held_locks+0xf0/0xf0 [ 623.018085] ? find_held_lock+0x2d/0x110 [ 623.022133] do_filp_open+0x18c/0x3f0 [ 623.025934] ? may_open_dev+0xf0/0xf0 [ 623.029751] ? lock_downgrade+0x750/0x750 [ 623.033884] ? lock_acquire+0x170/0x3f0 [ 623.037847] ? do_raw_spin_unlock+0x171/0x240 [ 623.042335] ? _raw_spin_unlock+0x29/0x40 [ 623.046484] ? __alloc_fd+0x2ab/0x590 [ 623.050278] do_sys_open+0x3b3/0x520 [ 623.053977] ? filp_open+0x70/0x70 [ 623.057507] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 623.062875] ? trace_hardirqs_off_caller+0x6e/0x210 [ 623.067880] ? do_syscall_64+0x21/0x670 [ 623.071845] do_syscall_64+0xf9/0x670 [ 623.075636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.080814] RIP: 0033:0x417951 [ 623.083999] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 623.103144] RSP: 002b:00007f98c62b6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 12:29:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:55 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 623.110841] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 623.118107] RDX: 0000000000000048 RSI: 0000000000000002 RDI: 00007f98c62b6ae0 [ 623.125362] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 623.132620] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 [ 623.139965] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 [ 623.216283] FAULT_INJECTION: forcing a failure. [ 623.216283] name failslab, interval 1, probability 0, space 0, times 0 [ 623.234284] CPU: 0 PID: 8153 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 623.242117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.251485] Call Trace: [ 623.254091] dump_stack+0x22c/0x33e [ 623.257737] should_fail.cold+0xa/0x2f [ 623.261637] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 623.266763] __should_failslab+0x153/0x1b6 [ 623.271020] should_failslab+0x5/0xf [ 623.274744] kmem_cache_alloc+0x2b1/0x4a0 [ 623.278905] __d_alloc+0x2b/0xa20 [ 623.282409] d_alloc+0x4a/0x230 [ 623.285703] d_alloc_parallel+0xeb/0x1b70 [ 623.289872] ? check_preemption_disabled+0x41/0x2b0 [ 623.294907] ? __d_lookup_rcu+0x6f0/0x6f0 [ 623.299067] ? __d_lookup+0x489/0x790 [ 623.302992] ? d_lookup+0x1aa/0x280 [ 623.306636] ? d_lookup+0x18e/0x280 [ 623.310276] lookup_open+0x4da/0x19c0 [ 623.314267] ? debug_mutex_wake_waiter+0x380/0x3e0 [ 623.319211] ? may_open+0x360/0x360 [ 623.323574] ? path_openat+0x1863/0x2e90 [ 623.327664] path_openat+0x187b/0x2e90 [ 623.331575] ? path_lookupat+0x8d0/0x8d0 [ 623.335649] ? mark_held_locks+0xf0/0xf0 [ 623.339735] ? find_held_lock+0x2d/0x110 [ 623.343811] do_filp_open+0x18c/0x3f0 [ 623.347623] ? may_open_dev+0xf0/0xf0 [ 623.351443] ? lock_downgrade+0x750/0x750 [ 623.355599] ? lock_acquire+0x170/0x3f0 [ 623.359591] ? do_raw_spin_unlock+0x171/0x240 [ 623.364102] ? _raw_spin_unlock+0x29/0x40 [ 623.368265] ? __alloc_fd+0x2ab/0x590 [ 623.372083] do_sys_open+0x3b3/0x520 [ 623.375809] ? filp_open+0x70/0x70 [ 623.379366] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 623.384740] ? trace_hardirqs_off_caller+0x6e/0x210 [ 623.389773] ? do_syscall_64+0x21/0x670 [ 623.393761] do_syscall_64+0xf9/0x670 [ 623.397576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.402774] RIP: 0033:0x417951 [ 623.405993] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 623.425163] RSP: 002b:00007f98c62b6a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 623.432886] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 623.440297] RDX: 0000000000000048 RSI: 0000000000000002 RDI: 00007f98c62b6ae0 [ 623.447562] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 623.454820] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000001 12:29:56 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 623.462087] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 [ 623.469475] BTRFS error (device loop5): open_ctree failed 12:29:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 623.616127] BTRFS info (device loop5): enabling free space tree [ 623.685423] BTRFS info (device loop5): using free space tree [ 623.701216] BTRFS info (device loop5): has skinny extents 12:29:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x11, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:56 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) r7 = signalfd(r0, &(0x7f0000000000)={[0x7]}, 0x8) r8 = dup3(r5, 0xffffffffffffffff, 0xeef1a947c26e5f5d) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r8, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x808000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="f0000000", @ANYRES16=0x0, @ANYBLOB="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"], 0xf0}, 0x1, 0x0, 0x0, 0x10}, 0xc000) ioctl$PPPIOCGDEBUG(r7, 0x80047441, &(0x7f0000000040)) 12:29:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:56 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030048000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 623.796441] BTRFS error (device loop5): open_ctree failed 12:29:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:56 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003004c000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 624.033844] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 624.065668] BTRFS error (device loop1): superblock checksum mismatch 12:29:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x22, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x11, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 624.237084] BTRFS error (device loop1): open_ctree failed [ 624.260359] BTRFS error (device loop1): superblock checksum mismatch 12:29:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 624.318036] BTRFS error (device loop1): open_ctree failed [ 624.421783] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 624.437515] BTRFS error (device loop1): superblock checksum mismatch [ 624.503996] BTRFS error (device loop1): open_ctree failed [ 624.525854] BTRFS error (device loop1): superblock checksum mismatch [ 624.529139] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 624.572024] BTRFS error (device loop1): open_ctree failed 12:29:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:57 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003044f000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x23, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:57 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$netlink(r1, 0x10e, 0x1, &(0x7f0000000140)=""/208, &(0x7f0000000040)=0xd0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYRES64=r2, @ANYRESDEC=r7], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x480, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 624.831107] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 624.852629] BTRFS error (device loop1): superblock checksum mismatch 12:29:57 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030450000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 624.932644] BTRFS error (device loop1): open_ctree failed [ 624.966435] BTRFS error (device loop1): superblock checksum mismatch 12:29:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 625.058069] BTRFS error (device loop1): open_ctree failed 12:29:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1100, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 625.280219] BTRFS info (device loop5): enabling free space tree [ 625.302354] BTRFS info (device loop5): using free space tree [ 625.322337] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:29:58 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030451000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 625.396431] BTRFS info (device loop5): has skinny extents 12:29:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 625.545044] attempt to access beyond end of device [ 625.551243] loop5: rw=4096, want=2064, limit=267 12:29:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:58 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r6, 0x8008f512, &(0x7f0000000000)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r7, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 625.593851] BTRFS error (device loop5): failed to read chunk root 12:29:58 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030452000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 625.671002] BTRFS error (device loop5): open_ctree failed [ 625.688370] BTRFS info (device loop5): disk space caching is enabled [ 625.699417] BTRFS info (device loop5): has skinny extents 12:29:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x60, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 625.709061] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 625.777005] attempt to access beyond end of device [ 625.782040] loop5: rw=4096, want=2064, limit=267 [ 625.792181] BTRFS error (device loop5): failed to read chunk root [ 625.934719] BTRFS error (device loop5): open_ctree failed 12:29:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x11, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x8004, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:58 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030453000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 625.991224] BTRFS info (device loop5): enabling free space tree [ 626.014127] BTRFS info (device loop5): using free space tree [ 626.057750] BTRFS info (device loop5): has skinny extents 12:29:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6b6b6b, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x64, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 626.159494] BTRFS error (device loop5): open_ctree failed 12:29:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 626.299563] BTRFS error (device loop1): superblock checksum mismatch [ 626.327492] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 626.341642] BTRFS error (device loop1): open_ctree failed [ 626.441710] BTRFS info (device loop5): enabling free space tree [ 626.464481] BTRFS info (device loop5): using free space tree 12:29:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:59 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030454000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:59 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x4700, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=@ipv4_newroute={0x144, 0x18, 0x400, 0x70bd29, 0x25dfdbfe, {0x2, 0x20, 0x10, 0x0, 0xfc, 0x0, 0x0, 0x4, 0x800}, [@RTA_DST={0x8, 0x1, @broadcast}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x7}, @RTA_METRICS={0x3d, 0x8, 0x0, 0x1, "a4a029c9543ea9475ddae88de8abdfca486e431021ca84de6e7c97299483ac365066f0f04da211587d9e6b739454b48873e158d8b0fdbc0cc9"}, @RTA_SRC={0x8, 0x2, @local}, @RTA_IIF={0x8}, @RTA_UID={0x8}, @RTA_PRIORITY={0x8, 0x6, 0x6}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_METRICS={0xa7, 0x8, 0x0, 0x1, "3bfa119abaa3714769bf690d26f9525a7ca0c881d74b9b0d796fb86f7e7c83fbbca98c6d992ff4c79eb8ca0c7cf987c55967aeca427ce6b14acb2d3916c5d52b44bbb86957cafed6c7961c73fa296ce5ba91b43ab80bfdbe324048dad37484a9d8e41c7b1887832e83278fb24eca076071a7b2c4fde9526b584597a0a494e667b048ed6e9bcc05105ac60dc3b254f9afc9eb009a96be5257aee335900b201b210c0f02"}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}]}, 0x144}, 0x1, 0x0, 0x0, 0x4004100}, 0x4044) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r7, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup2(r8, r0) r10 = creat(&(0x7f00000002c0)='./file0\x00', 0x44) setsockopt$rose(r10, 0x104, 0x6, &(0x7f0000000300)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r9, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x2, 0x6, 0x7}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r6, 0x0, 0x100000, 0x0) 12:29:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 626.501362] BTRFS info (device loop5): has skinny extents 12:29:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x88, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 626.560142] BTRFS error (device loop5): open_ctree failed [ 626.598898] BTRFS info (device loop5): disk space caching is enabled 12:29:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 626.628886] BTRFS info (device loop5): has skinny extents [ 626.631673] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:29:59 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:29:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:59 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030455000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:29:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xf0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 626.841021] f2fs_msg: 105 callbacks suppressed [ 626.841036] F2FS-fs (loop3): Invalid log sectors per block(5571587) log sectorsize(9) [ 626.866921] attempt to access beyond end of device [ 626.871898] loop5: rw=4096, want=2064, limit=267 [ 626.880540] BTRFS error (device loop5): failed to read chunk root [ 626.905557] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 626.915649] F2FS-fs (loop3): Unable to read 2th superblock [ 626.923655] F2FS-fs (loop3): Invalid log sectors per block(5571587) log sectorsize(9) [ 626.933247] BTRFS error (device loop5): open_ctree failed [ 626.934134] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:29:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x480, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:29:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x189, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:29:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 626.956002] F2FS-fs (loop3): Unable to read 2th superblock [ 626.976868] BTRFS error (device loop1): superblock checksum mismatch 12:29:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 627.065594] BTRFS error (device loop1): open_ctree failed [ 627.082361] F2FS-fs (loop3): Invalid log sectors per block(5571587) log sectorsize(9) [ 627.094838] BTRFS info (device loop5): enabling free space tree [ 627.105731] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:29:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:29:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x11000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 627.115315] BTRFS info (device loop5): using free space tree [ 627.125567] BTRFS info (device loop5): has skinny extents [ 627.132571] F2FS-fs (loop3): Unable to read 2th superblock [ 627.140279] F2FS-fs (loop3): Invalid log sectors per block(5571587) log sectorsize(9) [ 627.201723] attempt to access beyond end of device [ 627.208998] loop5: rw=4096, want=2064, limit=267 [ 627.223367] BTRFS error (device loop5): failed to read chunk root [ 627.257856] BTRFS error (device loop5): open_ctree failed [ 627.271851] BTRFS info (device loop5): disk space caching is enabled [ 627.280699] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 627.300238] BTRFS info (device loop5): has skinny extents [ 627.347763] attempt to access beyond end of device [ 627.352932] loop5: rw=4096, want=2064, limit=267 [ 627.373032] BTRFS error (device loop5): failed to read chunk root [ 627.428237] BTRFS error (device loop5): open_ctree failed 12:30:00 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x8001}, 0x8) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:30:00 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030456000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1fe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 627.786985] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 627.821206] BTRFS error (device loop1): superblock checksum mismatch 12:30:00 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030457000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 627.896433] BTRFS error (device loop1): open_ctree failed [ 627.909068] BTRFS error (device loop1): superblock checksum mismatch [ 627.934979] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 12:30:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6b6b6b00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x271, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 628.077550] BTRFS error (device loop1): open_ctree failed [ 628.231612] BTRFS info (device loop5): enabling free space tree [ 628.238126] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 628.252585] BTRFS info (device loop5): using free space tree [ 628.259608] BTRFS info (device loop5): has skinny extents [ 628.335134] attempt to access beyond end of device [ 628.341922] loop5: rw=4096, want=2064, limit=267 [ 628.360378] BTRFS error (device loop5): failed to read chunk root [ 628.372265] BTRFS error (device loop5): open_ctree failed 12:30:01 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) bind$netrom(r1, &(0x7f0000000140)={{0x3, @bcast, 0x2}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sync() r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r7, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r6, 0x0, 0x100000, 0x0) 12:30:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:01 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030458000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x80040000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x272, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 628.579297] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 628.595234] BTRFS info (device loop5): disk space caching is enabled 12:30:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xebffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 628.639935] BTRFS info (device loop5): has skinny extents [ 628.676107] attempt to access beyond end of device 12:30:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 628.690420] loop5: rw=4096, want=2064, limit=267 [ 628.701016] BTRFS error (device loop5): failed to read chunk root [ 628.742481] BTRFS error (device loop5): open_ctree failed [ 628.763359] BTRFS info (device loop5): enabling free space tree [ 628.794799] BTRFS info (device loop5): using free space tree 12:30:01 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030459000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1100, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 628.840792] BTRFS info (device loop5): has skinny extents 12:30:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 629.007960] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:0 old:/dev/loop4 new:/dev/loop1 [ 629.044854] attempt to access beyond end of device [ 629.052834] loop5: rw=4096, want=2064, limit=267 [ 629.062663] BTRFS error (device loop5): failed to read chunk root [ 629.147107] BTRFS error (device loop5): open_ctree failed [ 629.213672] BTRFS info (device loop5): enabling free space tree [ 629.239301] BTRFS info (device loop5): using free space tree [ 629.245500] BTRFS info (device loop5): has skinny extents [ 629.337087] BTRFS error (device loop5): open_ctree failed 12:30:02 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='veth0_to_batadv\x00', 0x31) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:30:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xfeffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:02 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003045a000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x273, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xfffffdfc, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xffffffeb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 629.579489] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:0 old:/dev/loop4 new:/dev/loop1 [ 629.596869] BTRFS info (device loop5): disk space caching is enabled 12:30:02 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030060000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 629.634755] BTRFS info (device loop5): has skinny extents 12:30:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:02 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:02 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030068000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 629.838616] FAULT_INJECTION: forcing a failure. [ 629.838616] name failslab, interval 1, probability 0, space 0, times 0 [ 629.873503] attempt to access beyond end of device [ 629.883360] loop5: rw=4096, want=2064, limit=267 [ 629.892053] CPU: 0 PID: 9010 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 629.899882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.899900] BTRFS error (device loop5): failed to read chunk root [ 629.909230] Call Trace: [ 629.909254] dump_stack+0x22c/0x33e [ 629.909276] should_fail.cold+0xa/0x2f [ 629.909294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 629.909309] ? lock_acquire+0x170/0x3f0 [ 629.909330] __should_failslab+0x153/0x1b6 [ 629.909351] should_failslab+0x5/0xf [ 629.942579] __kmalloc+0x2dd/0x4f0 [ 629.946199] ? __se_sys_memfd_create+0xf8/0x440 [ 629.950862] __se_sys_memfd_create+0xf8/0x440 [ 629.955352] ? memfd_file_seals_ptr+0x150/0x150 [ 629.960012] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 629.965367] ? trace_hardirqs_off_caller+0x6e/0x210 [ 629.970374] ? do_syscall_64+0x21/0x670 [ 629.974342] do_syscall_64+0xf9/0x670 [ 629.978425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.983600] RIP: 0033:0x45de59 [ 629.986782] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.005670] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 630.013457] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 630.020732] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 630.027988] RBP: 0000000000020000 R08: 0000000020000230 R09: 0000000000000000 [ 630.035244] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 630.042510] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 630.095144] BTRFS error (device loop5): open_ctree failed [ 630.117979] BTRFS info (device loop5): enabling free space tree [ 630.133922] BTRFS info (device loop5): using free space tree [ 630.175143] BTRFS info (device loop5): has skinny extents [ 630.262427] attempt to access beyond end of device [ 630.268757] loop5: rw=4096, want=2064, limit=267 [ 630.286206] BTRFS error (device loop5): failed to read chunk root 12:30:03 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000040)={0x0, 'veth0_to_bridge\x00', {0x1}}) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000000)={r2, 0x2, 0x1, 0xffffffff}) ioctl$SCSI_IOCTL_STOP_UNIT(r7, 0x6) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:30:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xfffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:03 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:03 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003006c000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 630.391558] BTRFS error (device loop5): open_ctree failed [ 630.436372] FAULT_INJECTION: forcing a failure. [ 630.436372] name failslab, interval 1, probability 0, space 0, times 0 [ 630.455057] CPU: 0 PID: 9064 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 630.462896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.472261] Call Trace: [ 630.474868] dump_stack+0x22c/0x33e [ 630.478515] should_fail.cold+0xa/0x2f [ 630.482426] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 630.487547] ? lock_acquire+0x170/0x3f0 [ 630.491547] __should_failslab+0x153/0x1b6 [ 630.495896] should_failslab+0x5/0xf [ 630.499599] kmem_cache_alloc+0x2b1/0x4a0 [ 630.503765] ? __alloc_fd+0x2ab/0x590 [ 630.507575] ? shmem_destroy_callback+0xb0/0xb0 [ 630.512241] shmem_alloc_inode+0x18/0x40 [ 630.516303] ? shmem_destroy_callback+0xb0/0xb0 [ 630.520986] alloc_inode+0x5d/0x180 [ 630.524627] new_inode+0x1d/0xf0 [ 630.528006] shmem_get_inode+0x96/0x8d0 [ 630.532007] __shmem_file_setup.part.0+0x7a/0x2b0 [ 630.536873] shmem_file_setup+0x61/0x90 [ 630.540861] __se_sys_memfd_create+0x26b/0x440 [ 630.545462] ? memfd_file_seals_ptr+0x150/0x150 [ 630.550142] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 630.555517] ? trace_hardirqs_off_caller+0x6e/0x210 [ 630.560550] ? do_syscall_64+0x21/0x670 [ 630.564542] do_syscall_64+0xf9/0x670 [ 630.568362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.573560] RIP: 0033:0x45de59 [ 630.576799] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.595712] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 630.603437] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 630.610723] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 630.618003] RBP: 0000000000020000 R08: 0000000020000230 R09: 0000000000000000 [ 630.625289] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 12:30:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x274, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x20000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 630.632568] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 12:30:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:03 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030074000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:03 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 630.807415] BTRFS info (device loop5): enabling free space tree [ 630.841661] BTRFS info (device loop5): using free space tree [ 630.871074] FAULT_INJECTION: forcing a failure. [ 630.871074] name failslab, interval 1, probability 0, space 0, times 0 [ 630.876701] BTRFS info (device loop5): has skinny extents [ 630.957454] CPU: 0 PID: 9095 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 630.965301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.974667] Call Trace: [ 630.977278] dump_stack+0x22c/0x33e [ 630.980928] should_fail.cold+0xa/0x2f [ 630.984845] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 630.989975] ? find_held_lock+0x2d/0x110 [ 630.994496] __should_failslab+0x153/0x1b6 [ 630.998750] should_failslab+0x5/0xf [ 631.002499] kmem_cache_alloc+0x2b1/0x4a0 [ 631.006670] selinux_inode_alloc_security+0xe6/0x2d0 [ 631.011794] security_inode_alloc+0x67/0xc0 [ 631.016129] inode_init_always+0x5a3/0xb70 [ 631.020384] alloc_inode+0x7a/0x180 [ 631.024026] new_inode+0x1d/0xf0 [ 631.027415] shmem_get_inode+0x96/0x8d0 [ 631.029543] attempt to access beyond end of device [ 631.031409] __shmem_file_setup.part.0+0x7a/0x2b0 [ 631.031430] shmem_file_setup+0x61/0x90 [ 631.031456] __se_sys_memfd_create+0x26b/0x440 [ 631.037631] loop5: rw=4096, want=2064, limit=267 [ 631.041221] ? memfd_file_seals_ptr+0x150/0x150 [ 631.041241] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 631.041255] ? trace_hardirqs_off_caller+0x6e/0x210 [ 631.041274] ? do_syscall_64+0x21/0x670 [ 631.051857] BTRFS error (device loop5): failed to read chunk root [ 631.054559] do_syscall_64+0xf9/0x670 [ 631.054582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.054596] RIP: 0033:0x45de59 [ 631.091952] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.110865] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 631.118593] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 631.125880] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 631.133170] RBP: 0000000000020000 R08: 0000000020000230 R09: 0000000000000000 [ 631.140461] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 631.147750] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 631.155586] BTRFS error (device loop5): open_ctree failed 12:30:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6b6b6b00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 631.195564] BTRFS info (device loop5): disk space caching is enabled [ 631.209405] BTRFS info (device loop5): has skinny extents 12:30:04 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000), 0x10) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, {{0xffffffff, 0x1ab, 0x1}}}, 0x28) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000140)=@netrom) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f00000000c0)=0x9, 0x4) 12:30:04 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003007a000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x275, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:04 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 631.349941] FAULT_INJECTION: forcing a failure. [ 631.349941] name failslab, interval 1, probability 0, space 0, times 0 [ 631.380355] CPU: 0 PID: 9151 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 631.383048] attempt to access beyond end of device [ 631.388193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.388200] Call Trace: [ 631.388223] dump_stack+0x22c/0x33e [ 631.388244] should_fail.cold+0xa/0x2f [ 631.388262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.388277] ? lock_acquire+0x170/0x3f0 [ 631.388301] __should_failslab+0x153/0x1b6 [ 631.388316] should_failslab+0x5/0xf [ 631.388328] kmem_cache_alloc+0x2b1/0x4a0 [ 631.388350] __d_alloc+0x2b/0xa20 [ 631.388373] d_alloc_pseudo+0x19/0x70 [ 631.388390] alloc_file_pseudo+0xc6/0x250 [ 631.388407] ? alloc_file+0x510/0x510 12:30:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:04 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 631.388424] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 631.388439] ? shmem_get_inode+0x44c/0x8d0 [ 631.388460] __shmem_file_setup.part.0+0x102/0x2b0 [ 631.388479] shmem_file_setup+0x61/0x90 [ 631.388498] __se_sys_memfd_create+0x26b/0x440 [ 631.388518] ? memfd_file_seals_ptr+0x150/0x150 [ 631.388534] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 631.388550] ? trace_hardirqs_off_caller+0x6e/0x210 [ 631.388626] ? do_syscall_64+0x21/0x670 [ 631.388648] do_syscall_64+0xf9/0x670 12:30:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 631.388668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.388680] RIP: 0033:0x45de59 [ 631.388696] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.388705] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 631.388719] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 631.388728] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c28a3 12:30:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x276, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 631.388737] RBP: 0000000000020000 R08: 0000000020000230 R09: 0000000000000000 [ 631.388747] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 631.388756] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 631.571267] loop5: rw=4096, want=2064, limit=267 [ 631.584068] BTRFS error (device loop5): failed to read chunk root [ 631.649296] FAULT_INJECTION: forcing a failure. [ 631.649296] name failslab, interval 1, probability 0, space 0, times 0 [ 631.674154] CPU: 0 PID: 9182 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 631.682002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.691369] Call Trace: [ 631.694017] dump_stack+0x22c/0x33e [ 631.697654] should_fail.cold+0xa/0x2f [ 631.701536] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.706646] ? lock_acquire+0x170/0x3f0 [ 631.710619] __should_failslab+0x153/0x1b6 [ 631.715202] should_failslab+0x5/0xf [ 631.718906] kmem_cache_alloc+0x2b1/0x4a0 [ 631.723048] __alloc_file+0x21/0x330 [ 631.726756] alloc_empty_file+0x6d/0x170 [ 631.730810] alloc_file+0x93/0x510 [ 631.734360] alloc_file_pseudo+0x165/0x250 [ 631.738589] ? alloc_file+0x510/0x510 [ 631.742380] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 631.748001] ? shmem_get_inode+0x44c/0x8d0 [ 631.752252] __shmem_file_setup.part.0+0x102/0x2b0 [ 631.757225] shmem_file_setup+0x61/0x90 [ 631.761192] __se_sys_memfd_create+0x26b/0x440 [ 631.765767] ? memfd_file_seals_ptr+0x150/0x150 [ 631.770428] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 631.775781] ? trace_hardirqs_off_caller+0x6e/0x210 [ 631.780789] ? do_syscall_64+0x21/0x670 [ 631.784755] do_syscall_64+0xf9/0x670 [ 631.788553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.793731] RIP: 0033:0x45de59 [ 631.796919] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.815812] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 631.823511] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 631.830776] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 631.838036] RBP: 0000000000020000 R08: 0000000020000230 R09: 0000000000000000 [ 631.845311] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 631.852571] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 631.909942] BTRFS error (device loop5): open_ctree failed [ 631.993199] BTRFS info (device loop5): enabling free space tree [ 632.012304] BTRFS info (device loop5): using free space tree [ 632.025176] BTRFS info (device loop5): has skinny extents [ 632.061923] attempt to access beyond end of device [ 632.070703] loop5: rw=4096, want=2064, limit=267 [ 632.078877] BTRFS error (device loop5): failed to read chunk root [ 632.098069] BTRFS error (device loop5): open_ctree failed [ 632.116757] BTRFS info (device loop5): disk space caching is enabled [ 632.128939] BTRFS info (device loop5): has skinny extents 12:30:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:05 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000000326f2000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:05 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:05 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100008, 0x0) [ 632.226639] BTRFS error (device loop5): open_ctree failed [ 632.318680] FAULT_INJECTION: forcing a failure. [ 632.318680] name failslab, interval 1, probability 0, space 0, times 0 [ 632.331723] CPU: 0 PID: 9253 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 632.339557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.348925] Call Trace: [ 632.351681] dump_stack+0x22c/0x33e [ 632.355336] should_fail.cold+0xa/0x2f [ 632.359245] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 632.364385] ? lock_acquire+0x170/0x3f0 [ 632.372465] __should_failslab+0x153/0x1b6 [ 632.376724] should_failslab+0x5/0xf [ 632.380484] kmem_cache_alloc+0x2b1/0x4a0 [ 632.384637] selinux_file_alloc_security+0xe4/0x1c0 [ 632.389654] security_file_alloc+0x40/0x90 [ 632.393889] __alloc_file+0xc9/0x330 [ 632.397622] alloc_empty_file+0x6d/0x170 [ 632.401693] alloc_file+0x93/0x510 [ 632.405228] alloc_file_pseudo+0x165/0x250 [ 632.409476] ? alloc_file+0x510/0x510 [ 632.413273] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 632.418890] ? shmem_get_inode+0x44c/0x8d0 [ 632.423117] __shmem_file_setup.part.0+0x102/0x2b0 [ 632.428039] shmem_file_setup+0x61/0x90 [ 632.432011] __se_sys_memfd_create+0x26b/0x440 [ 632.436584] ? memfd_file_seals_ptr+0x150/0x150 [ 632.441262] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 632.446616] ? trace_hardirqs_off_caller+0x6e/0x210 [ 632.451623] ? do_syscall_64+0x21/0x670 [ 632.455598] do_syscall_64+0xf9/0x670 [ 632.459410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.464588] RIP: 0033:0x45de59 [ 632.467786] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 632.487035] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 632.494744] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 632.502018] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 632.509287] RBP: 0000000000020000 R08: 0000000020000230 R09: 0000000000000000 12:30:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 632.517157] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 632.524415] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000880 [ 632.556200] f2fs_msg: 104 callbacks suppressed [ 632.556214] F2FS-fs (loop3): Invalid log sectors per block(15869443) log sectorsize(9) [ 632.612818] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 632.657502] F2FS-fs (loop3): Unable to read 2th superblock [ 632.686214] F2FS-fs (loop3): Invalid log sectors per block(15869443) log sectorsize(9) 12:30:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 632.731016] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 632.758538] F2FS-fs (loop3): Unable to read 2th superblock 12:30:05 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000000326f6000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 632.900679] F2FS-fs (loop3): Invalid log sectors per block(16131587) log sectorsize(9) [ 632.924050] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 632.950005] F2FS-fs (loop3): Unable to read 2th superblock 12:30:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:05 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000000303fb000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 632.971374] F2FS-fs (loop3): Invalid log sectors per block(16131587) log sectorsize(9) [ 633.085466] BTRFS info (device loop5): disk space caching is enabled [ 633.098522] BTRFS info (device loop5): has skinny extents 12:30:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x8004, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:06 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:06 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b00090000000301fe000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 633.206101] BTRFS error (device loop5): open_ctree failed [ 633.218429] BTRFS info (device loop5): enabling free space tree [ 633.234817] BTRFS info (device loop5): using free space tree [ 633.243870] BTRFS info (device loop5): has skinny extents [ 633.308431] FAULT_INJECTION: forcing a failure. [ 633.308431] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 633.335979] CPU: 1 PID: 9347 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 633.343825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.353191] Call Trace: [ 633.355806] dump_stack+0x22c/0x33e [ 633.359547] should_fail.cold+0xa/0x2f [ 633.363484] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 633.368615] __alloc_pages_nodemask+0x256/0x2a60 [ 633.373391] ? static_obj+0x50/0x50 [ 633.377027] ? mark_held_locks+0xf0/0xf0 [ 633.381095] ? __lock_acquire+0x6ec/0x3ff0 [ 633.385451] ? mark_held_locks+0xf0/0xf0 [ 633.389568] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 633.394397] ? __lock_acquire+0x6ec/0x3ff0 [ 633.398633] ? find_held_lock+0x2d/0x110 [ 633.402689] ? avc_has_perm_noaudit+0x1fd/0x3e0 [ 633.407350] ? lock_downgrade+0x750/0x750 [ 633.411508] ? lock_acquire+0x170/0x3f0 [ 633.415472] ? avc_has_perm_noaudit+0x9c/0x3e0 [ 633.420049] alloc_pages_vma+0xf2/0x800 [ 633.424021] shmem_alloc_page+0x11c/0x1f0 [ 633.428160] ? shmem_swapin+0x220/0x220 [ 633.432141] ? percpu_counter_add_batch+0x126/0x180 [ 633.437165] ? __vm_enough_memory+0x316/0x690 [ 633.441663] shmem_alloc_and_acct_page+0x15a/0x880 [ 633.446593] shmem_getpage_gfp+0x4e9/0x3a70 [ 633.450909] ? current_time+0x6f/0x1c0 [ 633.454788] ? shmem_alloc_and_acct_page+0x880/0x880 [ 633.459882] ? iov_iter_fault_in_readable+0x25c/0x510 [ 633.465063] ? iov_iter_init+0x1d0/0x1d0 [ 633.469113] shmem_write_begin+0xff/0x1e0 [ 633.473254] generic_perform_write+0x1f8/0x4d0 [ 633.477836] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 633.482493] ? current_time+0x1c0/0x1c0 [ 633.486574] ? lock_acquire+0x170/0x3f0 [ 633.490561] __generic_file_write_iter+0x24b/0x610 [ 633.495495] generic_file_write_iter+0x3f8/0x729 [ 633.500250] __vfs_write+0x51b/0x770 [ 633.503955] ? kernel_read+0x110/0x110 [ 633.507844] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 633.512850] ? rcu_sync_lockdep_assert+0x99/0x100 [ 633.517712] ? __sb_start_write+0x194/0x350 [ 633.522113] vfs_write+0x1f3/0x540 [ 633.525658] __x64_sys_pwrite64+0x1f7/0x250 [ 633.529968] ? ksys_pwrite64+0x1a0/0x1a0 [ 633.534017] ? trace_hardirqs_off_caller+0x6e/0x210 [ 633.539047] ? do_syscall_64+0x21/0x670 [ 633.543014] do_syscall_64+0xf9/0x670 [ 633.546806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.551982] RIP: 0033:0x4179b7 [ 633.555167] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 633.574058] RSP: 002b:00007f0fa8cc5a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 633.581753] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004179b7 [ 633.589034] RDX: 000000000000012b RSI: 0000000020010000 RDI: 0000000000000004 [ 633.596298] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 633.603553] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000002 [ 633.610832] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 12:30:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:06 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000000)=""/243) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:30:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:06 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030fff000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 633.658464] BTRFS error (device loop5): open_ctree failed 12:30:06 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x8000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 633.794252] BTRFS info (device loop5): disk space caching is enabled [ 633.805103] FAULT_INJECTION: forcing a failure. [ 633.805103] name failslab, interval 1, probability 0, space 0, times 0 [ 633.816339] CPU: 0 PID: 9390 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 633.824146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.833514] Call Trace: [ 633.836130] dump_stack+0x22c/0x33e [ 633.839779] should_fail.cold+0xa/0x2f 12:30:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x8004000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 633.843686] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 633.848803] ? __lock_acquire+0x6ec/0x3ff0 [ 633.853052] __should_failslab+0x153/0x1b6 [ 633.857302] should_failslab+0x5/0xf [ 633.861028] kmem_cache_alloc+0x43/0x4a0 [ 633.865113] ? __lock_acquire+0x6ec/0x3ff0 [ 633.869371] radix_tree_node_alloc.constprop.0+0x1e4/0x390 [ 633.875018] __radix_tree_create+0x382/0x680 [ 633.879447] __radix_tree_insert+0xbb/0x660 [ 633.883778] ? __radix_tree_create+0x680/0x680 [ 633.888354] ? lock_acquire+0x170/0x3f0 [ 633.892341] ? shmem_add_to_page_cache+0x306/0xc80 [ 633.897276] shmem_add_to_page_cache+0x616/0xc80 [ 633.902023] ? shmem_recalc_inode+0x310/0x310 [ 633.906509] ? __radix_tree_preload+0x262/0x340 [ 633.911193] shmem_getpage_gfp+0x20b0/0x3a70 [ 633.915594] ? current_time+0x6f/0x1c0 [ 633.919479] ? shmem_alloc_and_acct_page+0x880/0x880 [ 633.924584] ? iov_iter_fault_in_readable+0x25c/0x510 [ 633.929768] ? iov_iter_init+0x1d0/0x1d0 [ 633.933826] shmem_write_begin+0xff/0x1e0 [ 633.937986] generic_perform_write+0x1f8/0x4d0 [ 633.942567] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 633.947230] ? current_time+0x1c0/0x1c0 [ 633.951198] ? lock_acquire+0x170/0x3f0 [ 633.955168] __generic_file_write_iter+0x24b/0x610 [ 633.960158] generic_file_write_iter+0x3f8/0x729 [ 633.964930] __vfs_write+0x51b/0x770 [ 633.968635] ? kernel_read+0x110/0x110 [ 633.972522] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 633.977527] ? rcu_sync_lockdep_assert+0x99/0x100 [ 633.982362] ? __sb_start_write+0x194/0x350 [ 633.986673] vfs_write+0x1f3/0x540 [ 633.990211] __x64_sys_pwrite64+0x1f7/0x250 [ 633.994623] ? ksys_pwrite64+0x1a0/0x1a0 [ 633.998678] ? trace_hardirqs_off_caller+0x6e/0x210 [ 634.003687] ? do_syscall_64+0x21/0x670 [ 634.007654] do_syscall_64+0xf9/0x670 [ 634.011449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.016626] RIP: 0033:0x4179b7 [ 634.019809] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 634.038786] RSP: 002b:00007f0fa8cc5a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 634.046481] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004179b7 [ 634.053741] RDX: 000000000000012b RSI: 0000000020010000 RDI: 0000000000000004 [ 634.061018] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 634.068277] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000002 [ 634.075535] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 12:30:06 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000d0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 634.115738] BTRFS info (device loop5): has skinny extents 12:30:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xebffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 634.188767] attempt to access beyond end of device [ 634.193979] loop5: rw=4096, want=2064, limit=267 [ 634.202380] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 634.232079] BTRFS error (device loop5): failed to read chunk root [ 634.268941] BTRFS error (device loop5): open_ctree failed [ 634.286218] BTRFS info (device loop5): enabling free space tree [ 634.292340] BTRFS info (device loop5): using free space tree 12:30:07 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 634.362638] BTRFS info (device loop5): has skinny extents [ 634.422563] FAULT_INJECTION: forcing a failure. [ 634.422563] name failslab, interval 1, probability 0, space 0, times 0 [ 634.480500] CPU: 1 PID: 9446 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 634.488356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.497809] Call Trace: [ 634.500418] dump_stack+0x22c/0x33e [ 634.504069] should_fail.cold+0xa/0x2f [ 634.507968] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 634.513587] ? lock_acquire+0x170/0x3f0 [ 634.517559] __should_failslab+0x153/0x1b6 [ 634.521785] should_failslab+0x5/0xf [ 634.525490] kmem_cache_alloc+0x2b1/0x4a0 [ 634.529634] getname_flags+0xce/0x590 [ 634.533425] do_sys_open+0x26c/0x520 [ 634.537145] ? filp_open+0x70/0x70 [ 634.540684] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 634.546039] ? trace_hardirqs_off_caller+0x6e/0x210 [ 634.551048] ? do_syscall_64+0x21/0x670 [ 634.555014] do_syscall_64+0xf9/0x670 [ 634.558899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.564110] RIP: 0033:0x417951 [ 634.567293] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 634.586183] RSP: 002b:00007f0fa8cc5a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 634.593879] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000417951 [ 634.601134] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f0fa8cc5ae0 [ 634.608392] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 634.615648] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 634.622904] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 12:30:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:07 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003000000100000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:07 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) r8 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) splice(r8, 0x0, r5, 0x0, 0x100000, 0x0) 12:30:07 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 634.717564] BTRFS error (device loop5): open_ctree failed 12:30:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 634.832731] FAULT_INJECTION: forcing a failure. [ 634.832731] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 634.844586] CPU: 1 PID: 9488 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 634.852397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.861762] Call Trace: [ 634.864369] dump_stack+0x22c/0x33e [ 634.868028] should_fail.cold+0xa/0x2f [ 634.871936] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 634.877049] ? find_held_lock+0x2d/0x110 12:30:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 634.881119] ? avc_has_perm+0x1d7/0x450 [ 634.885372] __alloc_pages_nodemask+0x256/0x2a60 [ 634.890141] ? mark_held_locks+0xf0/0xf0 [ 634.894215] ? check_preemption_disabled+0x41/0x2b0 [ 634.899264] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 634.904123] ? lock_downgrade+0x750/0x750 [ 634.908295] ? up_write+0x18/0x150 [ 634.911851] ? generic_file_write_iter+0x381/0x729 [ 634.916802] cache_grow_begin+0xa1/0x9b0 [ 634.920884] cache_alloc_refill+0x2aa/0x410 [ 634.925224] kmem_cache_alloc+0x3b4/0x4a0 [ 634.929403] getname_flags+0xce/0x590 12:30:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 634.933219] do_sys_open+0x26c/0x520 [ 634.936947] ? filp_open+0x70/0x70 [ 634.940505] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 634.945889] ? trace_hardirqs_off_caller+0x6e/0x210 [ 634.950943] ? do_syscall_64+0x21/0x670 [ 634.954927] do_syscall_64+0xf9/0x670 [ 634.958740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.963937] RIP: 0033:0x417951 12:30:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 634.967136] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 634.986051] RSP: 002b:00007f0fa8cc5a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 634.993773] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000417951 [ 635.001142] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f0fa8cc5ae0 [ 635.008424] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 635.015706] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 635.022991] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 635.091731] BTRFS info (device loop5): disk space caching is enabled [ 635.107420] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 635.130362] BTRFS info (device loop5): has skinny extents [ 635.152523] attempt to access beyond end of device [ 635.163427] loop5: rw=4096, want=2064, limit=267 [ 635.172568] BTRFS error (device loop5): failed to read chunk root [ 635.208325] BTRFS error (device loop5): open_ctree failed [ 635.234065] BTRFS info (device loop5): enabling free space tree [ 635.261279] BTRFS info (device loop5): using free space tree [ 635.275958] BTRFS info (device loop5): has skinny extents [ 635.318089] attempt to access beyond end of device [ 635.331467] loop5: rw=4096, want=2064, limit=267 [ 635.341620] BTRFS error (device loop5): failed to read chunk root [ 635.386534] BTRFS error (device loop5): open_ctree failed [ 635.455543] BTRFS info (device loop5): enabling free space tree [ 635.462249] BTRFS info (device loop5): using free space tree [ 635.486648] BTRFS info (device loop5): has skinny extents [ 635.515172] attempt to access beyond end of device [ 635.522601] loop5: rw=4096, want=2064, limit=267 [ 635.532243] BTRFS error (device loop5): failed to read chunk root [ 635.551426] BTRFS error (device loop5): open_ctree failed 12:30:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x700, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:08 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003000000140000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:08 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:08 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:30:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6b6b6b, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 635.668776] FAULT_INJECTION: forcing a failure. [ 635.668776] name failslab, interval 1, probability 0, space 0, times 0 [ 635.692736] CPU: 0 PID: 9610 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 635.700579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.709937] Call Trace: [ 635.712540] dump_stack+0x22c/0x33e [ 635.716190] should_fail.cold+0xa/0x2f [ 635.720102] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 635.725219] ? lock_acquire+0x170/0x3f0 [ 635.729214] __should_failslab+0x153/0x1b6 [ 635.733460] should_failslab+0x5/0xf [ 635.737358] kmem_cache_alloc+0x2b1/0x4a0 [ 635.741622] ? __save_stack_trace+0x99/0x100 [ 635.746056] __alloc_file+0x21/0x330 [ 635.749786] alloc_empty_file+0x6d/0x170 [ 635.753864] path_openat+0x12b/0x2e90 [ 635.757682] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.763063] ? path_lookupat+0x8d0/0x8d0 [ 635.767121] ? mark_held_locks+0xf0/0xf0 [ 635.771173] ? find_held_lock+0x2d/0x110 [ 635.775226] do_filp_open+0x18c/0x3f0 [ 635.779012] ? may_open_dev+0xf0/0xf0 [ 635.782806] ? find_held_lock+0x2d/0x110 [ 635.786887] ? __alloc_fd+0x2ab/0x590 [ 635.790682] ? lock_downgrade+0x750/0x750 [ 635.794820] ? lock_acquire+0x170/0x3f0 [ 635.798788] ? do_raw_spin_unlock+0x171/0x240 [ 635.803293] ? _raw_spin_unlock+0x29/0x40 [ 635.807429] ? __alloc_fd+0x2ab/0x590 [ 635.811224] do_sys_open+0x3b3/0x520 [ 635.814925] ? filp_open+0x70/0x70 [ 635.818456] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 635.823812] ? trace_hardirqs_off_caller+0x6e/0x210 [ 635.828817] ? do_syscall_64+0x21/0x670 [ 635.832782] do_syscall_64+0xf9/0x670 [ 635.836573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.841749] RIP: 0033:0x417951 [ 635.844939] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 12:30:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 635.863844] RSP: 002b:00007f0fa8cc5a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 635.871538] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000417951 [ 635.878793] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f0fa8cc5ae0 [ 635.886049] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 635.893306] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 635.900564] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 12:30:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 635.972203] BTRFS info (device loop5): disk space caching is enabled [ 635.989450] BTRFS info (device loop5): has skinny extents 12:30:08 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000001f0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:08 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 636.184161] FAULT_INJECTION: forcing a failure. [ 636.184161] name failslab, interval 1, probability 0, space 0, times 0 [ 636.203760] CPU: 1 PID: 9672 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 636.211596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.220963] Call Trace: [ 636.223577] dump_stack+0x22c/0x33e [ 636.227227] should_fail.cold+0xa/0x2f [ 636.231134] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 636.237123] ? lock_acquire+0x170/0x3f0 [ 636.241124] __should_failslab+0x153/0x1b6 [ 636.245374] should_failslab+0x5/0xf [ 636.249224] kmem_cache_alloc+0x2b1/0x4a0 [ 636.253397] selinux_file_alloc_security+0xe4/0x1c0 [ 636.258434] security_file_alloc+0x40/0x90 [ 636.262690] __alloc_file+0xc9/0x330 [ 636.266434] alloc_empty_file+0x6d/0x170 [ 636.270708] path_openat+0x12b/0x2e90 [ 636.274530] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.279920] ? path_lookupat+0x8d0/0x8d0 [ 636.284016] ? mark_held_locks+0xf0/0xf0 [ 636.288097] ? find_held_lock+0x2d/0x110 [ 636.292179] do_filp_open+0x18c/0x3f0 [ 636.295999] ? may_open_dev+0xf0/0xf0 [ 636.299810] ? find_held_lock+0x2d/0x110 [ 636.303915] ? __alloc_fd+0x2ab/0x590 [ 636.307734] ? lock_downgrade+0x750/0x750 [ 636.311901] ? lock_acquire+0x170/0x3f0 [ 636.315898] ? do_raw_spin_unlock+0x171/0x240 [ 636.320407] ? _raw_spin_unlock+0x29/0x40 [ 636.324571] ? __alloc_fd+0x2ab/0x590 [ 636.328394] do_sys_open+0x3b3/0x520 [ 636.332121] ? filp_open+0x70/0x70 [ 636.335680] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 636.341065] ? trace_hardirqs_off_caller+0x6e/0x210 [ 636.346106] ? do_syscall_64+0x21/0x670 [ 636.350142] do_syscall_64+0xf9/0x670 [ 636.353965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.359183] RIP: 0033:0x417951 [ 636.362390] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 636.381306] RSP: 002b:00007f0fa8cc5a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 636.389033] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000417951 [ 636.396349] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f0fa8cc5ae0 [ 636.403638] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 636.410925] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 636.418250] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 636.473451] attempt to access beyond end of device [ 636.481087] loop5: rw=4096, want=2064, limit=267 [ 636.506453] BTRFS error (device loop5): failed to read chunk root [ 636.555977] BTRFS error (device loop5): open_ctree failed [ 636.575672] BTRFS info (device loop5): enabling free space tree [ 636.584365] BTRFS info (device loop5): using free space tree [ 636.598243] BTRFS info (device loop5): has skinny extents 12:30:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x900, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:09 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003000000300000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:09 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f00000001c0)=@urb_type_bulk={0x3, {0x9, 0x1}, 0x9, 0x80, &(0x7f0000000040)="9d754d53d2be589c35bb5ec62bd9bc5735f3cce683d3113c61098ee296dc7b36edada67845501c36d0321015e4639c735433f66532cec4192c84b6f05147465f390794d402fac8ab029b16a7e44d478f31052d1b41133b625c7b544527cd09143d9237c35178d31ce96470435b633bfe49ac2afa11c3635e2d49fde910d48c109908c052db5da29817721a68586529a3e7f05604822636b74986bf54e9e24f", 0x9f, 0x1, 0x20, 0x8, 0x5ba, 0x3f, &(0x7f0000000140)="4168a7162c1245b23bbc8aba41b302b6551b459d4a60bffdb9679e31c05f856b198fb566aefbe91237c6ad4636e822da52637a1cb42764369e30a4ba14f26f3404ad5ef28a2744ea96527197958ad36c823b09e46a1d200ceb015614ccdf7ba13226271a50e288fff286e469ef11a6fac68a43"}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x100000, 0x0) 12:30:09 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 636.667295] BTRFS error (device loop5): open_ctree failed [ 636.760021] FAULT_INJECTION: forcing a failure. [ 636.760021] name failslab, interval 1, probability 0, space 0, times 0 [ 636.782535] CPU: 0 PID: 9733 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 636.790382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.799747] Call Trace: [ 636.802343] dump_stack+0x22c/0x33e [ 636.805992] should_fail.cold+0xa/0x2f [ 636.809901] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 636.815041] __should_failslab+0x153/0x1b6 [ 636.819298] should_failslab+0x5/0xf [ 636.823029] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 636.827717] ? loop_info64_to_compat+0x5e0/0x5e0 [ 636.833796] ? loop_info64_to_compat+0x5e0/0x5e0 [ 636.838570] __kthread_create_on_node+0xd2/0x410 [ 636.843347] ? kthread_parkme+0xa0/0xa0 [ 636.847337] ? lo_ioctl+0x1bb/0x2200 [ 636.851064] ? __mutex_lock+0x3bd/0x13f0 [ 636.855121] ? lock_downgrade+0x750/0x750 [ 636.859264] ? loop_info64_to_compat+0x5e0/0x5e0 [ 636.864011] kthread_create_on_node+0xbb/0xf0 [ 636.868500] ? __kthread_create_on_node+0x410/0x410 [ 636.873505] ? __fget+0x3ad/0x570 [ 636.876953] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 636.881177] ? __lockdep_init_map+0x100/0x5c0 [ 636.885663] ? __lockdep_init_map+0x100/0x5c0 [ 636.890152] lo_ioctl+0xad3/0x2200 [ 636.893687] ? __kasan_slab_free+0x186/0x1f0 [ 636.898084] ? loop_set_status64+0x110/0x110 [ 636.902487] blkdev_ioctl+0x5cb/0x1a7e [ 636.906365] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.911719] ? blkpg_ioctl+0x9c0/0x9c0 [ 636.915602] ? mark_held_locks+0xf0/0xf0 [ 636.919656] ? find_held_lock+0x2d/0x110 [ 636.923715] ? debug_check_no_obj_freed+0x201/0x482 [ 636.928730] block_ioctl+0xe9/0x130 [ 636.932347] ? blkdev_fallocate+0x3f0/0x3f0 [ 636.936661] do_vfs_ioctl+0xcdb/0x12e0 [ 636.940543] ? selinux_file_ioctl+0x44f/0x5e0 [ 636.945029] ? ioctl_preallocate+0x200/0x200 [ 636.949432] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 636.954871] ? __fget+0x3ad/0x570 [ 636.958316] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 636.962542] ? putname+0xe1/0x130 [ 636.965995] ksys_ioctl+0x9b/0xc0 [ 636.969442] __x64_sys_ioctl+0x6f/0xb0 [ 636.973321] do_syscall_64+0xf9/0x670 [ 636.977122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.982299] RIP: 0033:0x45dcc7 [ 636.985483] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:30:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x551, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x118f44, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 637.004371] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 637.012069] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 637.019330] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 637.026616] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 637.033876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 637.041134] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 637.106692] ================================================================================ [ 637.115638] UBSAN: Undefined behaviour in fs/f2fs/super.c:2227:16 [ 637.121892] shift exponent 48 is too large for 32-bit type 'int' [ 637.128060] CPU: 1 PID: 9736 Comm: syz-executor.3 Not tainted 4.19.150-syzkaller #0 [ 637.135865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.145234] Call Trace: [ 637.147842] dump_stack+0x22c/0x33e [ 637.151500] ubsan_epilogue+0xe/0x3a [ 637.155242] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 637.162019] ? __bread_gfp+0x81/0x300 [ 637.165984] f2fs_fill_super.cold+0x1f9/0x5fb [ 637.170509] ? vsnprintf+0x2cc/0x14f0 [ 637.174474] ? lock_downgrade+0x750/0x750 [ 637.178668] ? snprintf+0xbb/0xf0 [ 637.182138] ? f2fs_commit_super+0x400/0x400 [ 637.186576] ? __mutex_add_waiter+0x160/0x160 [ 637.191098] ? set_blocksize+0x163/0x3f0 [ 637.195186] mount_bdev+0x2fc/0x3b0 [ 637.198836] ? f2fs_commit_super+0x400/0x400 [ 637.203259] mount_fs+0xa3/0x318 [ 637.206643] vfs_kern_mount.part.0+0x68/0x470 [ 637.211155] do_mount+0x51c/0x2f10 [ 637.214711] ? check_preemption_disabled+0x41/0x2b0 [ 637.219739] ? copy_mount_string+0x40/0x40 [ 637.223993] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 637.228849] ? _copy_from_user+0xd2/0x130 [ 637.233103] ? copy_mount_options+0x261/0x370 [ 637.237614] ksys_mount+0xcf/0x130 [ 637.241167] __x64_sys_mount+0xba/0x150 [ 637.245154] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 637.249763] do_syscall_64+0xf9/0x670 [ 637.253577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.258768] RIP: 0033:0x4608aa [ 637.261955] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 637.280876] RSP: 002b:00007f5202b9fa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 637.288576] RAX: ffffffffffffffda RBX: 00007f5202b9fb20 RCX: 00000000004608aa [ 637.295835] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f5202b9fae0 12:30:10 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 637.303095] RBP: 00007f5202b9fae0 R08: 00007f5202b9fb20 R09: 0000000020000000 [ 637.310356] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 637.317637] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000580 [ 637.324929] ================================================================================ [ 637.357655] FAULT_INJECTION: forcing a failure. [ 637.357655] name failslab, interval 1, probability 0, space 0, times 0 [ 637.369205] CPU: 1 PID: 9760 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 637.377014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.386405] Call Trace: [ 637.389014] dump_stack+0x22c/0x33e [ 637.392662] should_fail.cold+0xa/0x2f [ 637.396584] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 637.401704] __should_failslab+0x153/0x1b6 [ 637.405953] should_failslab+0x5/0xf [ 637.409680] kmem_cache_alloc+0x2b1/0x4a0 [ 637.413843] __kernfs_new_node+0xd2/0x680 [ 637.418000] ? kernfs_find_ns+0x370/0x370 [ 637.422139] ? kernfs_activate+0x2c/0x1d0 [ 637.426288] ? lock_downgrade+0x750/0x750 [ 637.430443] ? kernfs_add_one+0x51/0x4c0 [ 637.434522] ? ww_mutex_unlock+0x2f0/0x2f0 [ 637.438789] ? __mutex_unlock_slowpath+0xea/0x660 [ 637.443654] kernfs_new_node+0x92/0x120 [ 637.447645] __kernfs_create_file+0x51/0x33f [ 637.452067] sysfs_add_file_mode_ns+0x226/0x540 [ 637.456753] internal_create_group+0x355/0xba0 [ 637.461351] ? sysfs_remove_link_from_group+0x70/0x70 [ 637.466550] ? lock_downgrade+0x750/0x750 [ 637.470719] lo_ioctl+0xf87/0x2200 [ 637.474274] ? loop_set_status64+0x110/0x110 [ 637.478696] blkdev_ioctl+0x5cb/0x1a7e [ 637.482594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.487967] ? blkpg_ioctl+0x9c0/0x9c0 [ 637.491866] ? mark_held_locks+0xf0/0xf0 [ 637.495963] ? find_held_lock+0x2d/0x110 [ 637.500095] ? debug_check_no_obj_freed+0x201/0x482 [ 637.505134] block_ioctl+0xe9/0x130 [ 637.508768] ? blkdev_fallocate+0x3f0/0x3f0 [ 637.513184] do_vfs_ioctl+0xcdb/0x12e0 [ 637.517082] ? selinux_file_ioctl+0x44f/0x5e0 [ 637.521585] ? ioctl_preallocate+0x200/0x200 [ 637.526015] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 637.531478] ? __fget+0x3ad/0x570 [ 637.534943] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 637.539183] ? putname+0xe1/0x130 [ 637.542659] ksys_ioctl+0x9b/0xc0 [ 637.546125] __x64_sys_ioctl+0x6f/0xb0 [ 637.550027] do_syscall_64+0xf9/0x670 [ 637.553851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.559046] RIP: 0033:0x45dcc7 [ 637.562249] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 637.581243] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 637.588960] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 637.596234] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 637.603509] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 637.610787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 637.618060] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 12:30:10 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x38}, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r4, 0x0, r4, 0x0, 0x100000, 0x1) [ 637.661053] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 637.687553] BTRFS info (device loop5): disk space caching is enabled 12:30:10 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000003e0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:10 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 637.718224] BTRFS info (device loop5): has skinny extents [ 637.859447] BTRFS error (device loop5): open_ctree failed [ 637.870284] BTRFS info (device loop5): enabling free space tree [ 637.885944] BTRFS info (device loop5): using free space tree [ 637.894333] f2fs_msg: 80 callbacks suppressed [ 637.894346] F2FS-fs (loop3): Invalid blocksize (1073741824), supports only 4KB [ 637.894346] [ 637.912201] BTRFS info (device loop5): has skinny extents [ 637.918141] FAULT_INJECTION: forcing a failure. [ 637.918141] name failslab, interval 1, probability 0, space 0, times 0 [ 637.927832] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 637.942206] CPU: 0 PID: 9802 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 637.950036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.953077] F2FS-fs (loop3): Unable to read 2th superblock [ 637.959393] Call Trace: [ 637.959417] dump_stack+0x22c/0x33e [ 637.959438] should_fail.cold+0xa/0x2f [ 637.959462] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 637.959486] __should_failslab+0x153/0x1b6 [ 637.984448] should_failslab+0x5/0xf [ 637.988153] kmem_cache_alloc+0x2b1/0x4a0 [ 637.992294] __kernfs_new_node+0xd2/0x680 [ 637.996452] ? kernfs_find_ns+0x370/0x370 [ 638.000587] ? kernfs_activate+0x2c/0x1d0 [ 638.004722] ? lock_downgrade+0x750/0x750 [ 638.008857] ? kernfs_add_one+0x51/0x4c0 [ 638.012924] ? ww_mutex_unlock+0x2f0/0x2f0 [ 638.017161] ? __mutex_unlock_slowpath+0xea/0x660 [ 638.022009] kernfs_new_node+0x92/0x120 [ 638.025985] __kernfs_create_file+0x51/0x33f [ 638.030389] sysfs_add_file_mode_ns+0x226/0x540 [ 638.035053] internal_create_group+0x355/0xba0 [ 638.039632] ? sysfs_remove_link_from_group+0x70/0x70 [ 638.044826] ? lock_downgrade+0x750/0x750 [ 638.048976] lo_ioctl+0xf87/0x2200 [ 638.052512] ? loop_set_status64+0x110/0x110 [ 638.056912] blkdev_ioctl+0x5cb/0x1a7e [ 638.060809] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.066162] ? blkpg_ioctl+0x9c0/0x9c0 [ 638.070045] ? mark_held_locks+0xf0/0xf0 [ 638.075226] ? find_held_lock+0x2d/0x110 [ 638.079280] ? debug_check_no_obj_freed+0x201/0x482 [ 638.084294] block_ioctl+0xe9/0x130 [ 638.087915] ? blkdev_fallocate+0x3f0/0x3f0 [ 638.092227] do_vfs_ioctl+0xcdb/0x12e0 [ 638.096127] ? selinux_file_ioctl+0x44f/0x5e0 [ 638.100615] ? ioctl_preallocate+0x200/0x200 [ 638.105027] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 638.110553] ? __fget+0x3ad/0x570 [ 638.113999] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 638.118222] ? putname+0xe1/0x130 [ 638.121674] ksys_ioctl+0x9b/0xc0 [ 638.125122] __x64_sys_ioctl+0x6f/0xb0 [ 638.129009] do_syscall_64+0xf9/0x670 [ 638.132889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.138068] RIP: 0033:0x45dcc7 [ 638.141262] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.160163] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 638.167863] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 638.175183] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 638.182441] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 638.189698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 638.196967] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 638.214521] F2FS-fs (loop3): Invalid blocksize (1073741824), supports only 4KB [ 638.214521] [ 638.224622] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 638.238679] F2FS-fs (loop3): Unable to read 2th superblock [ 638.333634] BTRFS error (device loop5): open_ctree failed [ 638.343152] F2FS-fs (loop3): Invalid blocksize (1073741824), supports only 4KB [ 638.343152] [ 638.363351] BTRFS error (device loop1): superblock checksum mismatch [ 638.370465] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:30:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1100, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0xffffff1f, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 638.380805] BTRFS error (device loop1): open_ctree failed [ 638.387320] F2FS-fs (loop3): Unable to read 2th superblock [ 638.418163] F2FS-fs (loop3): Invalid blocksize (1073741824), supports only 4KB [ 638.418163] 12:30:11 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:11 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000003f0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:11 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x10980) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) [ 638.603224] FAULT_INJECTION: forcing a failure. [ 638.603224] name failslab, interval 1, probability 0, space 0, times 0 [ 638.625973] CPU: 1 PID: 9869 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 638.633813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.643181] Call Trace: [ 638.645788] dump_stack+0x22c/0x33e [ 638.649433] should_fail.cold+0xa/0x2f [ 638.653329] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 638.658453] __should_failslab+0x153/0x1b6 [ 638.662692] should_failslab+0x5/0xf [ 638.666410] kmem_cache_alloc+0x2b1/0x4a0 [ 638.670565] __kernfs_new_node+0xd2/0x680 [ 638.674718] ? kernfs_find_ns+0x370/0x370 [ 638.678876] ? __mutex_unlock_slowpath+0xea/0x660 [ 638.683733] ? __mutex_add_waiter+0x160/0x160 [ 638.688238] ? kernfs_next_descendant_post+0x19c/0x290 [ 638.693528] kernfs_new_node+0x92/0x120 [ 638.697511] __kernfs_create_file+0x51/0x33f [ 638.701929] sysfs_add_file_mode_ns+0x226/0x540 [ 638.706700] internal_create_group+0x355/0xba0 [ 638.711304] ? sysfs_remove_link_from_group+0x70/0x70 [ 638.716497] ? lock_downgrade+0x750/0x750 [ 638.720669] lo_ioctl+0xf87/0x2200 [ 638.724223] ? loop_set_status64+0x110/0x110 [ 638.728641] blkdev_ioctl+0x5cb/0x1a7e [ 638.732535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.737905] ? blkpg_ioctl+0x9c0/0x9c0 [ 638.741801] ? mark_held_locks+0xf0/0xf0 [ 638.745872] ? find_held_lock+0x2d/0x110 [ 638.749938] ? debug_check_no_obj_freed+0x201/0x482 [ 638.754970] block_ioctl+0xe9/0x130 [ 638.758606] ? blkdev_fallocate+0x3f0/0x3f0 [ 638.762934] do_vfs_ioctl+0xcdb/0x12e0 [ 638.766836] ? selinux_file_ioctl+0x44f/0x5e0 [ 638.771340] ? ioctl_preallocate+0x200/0x200 [ 638.775758] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 638.781216] ? __fget+0x3ad/0x570 [ 638.784679] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 638.788916] ? putname+0xe1/0x130 [ 638.792388] ksys_ioctl+0x9b/0xc0 [ 638.795852] __x64_sys_ioctl+0x6f/0xb0 [ 638.799745] do_syscall_64+0xf9/0x670 [ 638.803563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.808753] RIP: 0033:0x45dcc7 [ 638.811949] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.830938] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 638.838650] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 638.845920] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 638.853195] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 638.860467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 638.867743] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 12:30:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 638.903845] BTRFS info (device loop5): enabling free space tree [ 638.917540] BTRFS info (device loop5): using free space tree [ 638.938227] BTRFS info (device loop5): has skinny extents [ 638.966612] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:30:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:11 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000004d0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:11 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 639.121014] attempt to access beyond end of device [ 639.126127] loop5: rw=4096, want=2064, limit=267 [ 639.153427] BTRFS error (device loop5): failed to read chunk root 12:30:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 639.285487] FAULT_INJECTION: forcing a failure. [ 639.285487] name failslab, interval 1, probability 0, space 0, times 0 [ 639.317635] CPU: 1 PID: 9935 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 639.325493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.334850] Call Trace: [ 639.337457] dump_stack+0x22c/0x33e [ 639.341107] should_fail.cold+0xa/0x2f [ 639.345005] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 639.350137] __should_failslab+0x153/0x1b6 [ 639.354389] should_failslab+0x5/0xf [ 639.358112] kmem_cache_alloc+0x2b1/0x4a0 [ 639.362267] __kernfs_new_node+0xd2/0x680 [ 639.366421] ? kernfs_find_ns+0x370/0x370 [ 639.370578] ? __mutex_unlock_slowpath+0xea/0x660 [ 639.375439] ? __mutex_add_waiter+0x160/0x160 [ 639.379946] ? kernfs_next_descendant_post+0x19c/0x290 [ 639.385242] kernfs_new_node+0x92/0x120 [ 639.389247] __kernfs_create_file+0x51/0x33f [ 639.393677] sysfs_add_file_mode_ns+0x226/0x540 [ 639.398368] internal_create_group+0x355/0xba0 [ 639.402972] ? sysfs_remove_link_from_group+0x70/0x70 [ 639.408254] ? lock_downgrade+0x750/0x750 [ 639.412421] lo_ioctl+0xf87/0x2200 [ 639.415973] ? loop_set_status64+0x110/0x110 [ 639.420398] blkdev_ioctl+0x5cb/0x1a7e [ 639.424316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.429692] ? blkpg_ioctl+0x9c0/0x9c0 [ 639.433585] ? mark_held_locks+0xf0/0xf0 [ 639.437651] ? find_held_lock+0x2d/0x110 [ 639.441720] ? debug_check_no_obj_freed+0x201/0x482 [ 639.446752] block_ioctl+0xe9/0x130 [ 639.450382] ? blkdev_fallocate+0x3f0/0x3f0 [ 639.454709] do_vfs_ioctl+0xcdb/0x12e0 [ 639.458606] ? selinux_file_ioctl+0x44f/0x5e0 [ 639.463108] ? ioctl_preallocate+0x200/0x200 [ 639.467530] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 639.472984] ? __fget+0x3ad/0x570 [ 639.476457] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 639.480696] ? putname+0xe1/0x130 [ 639.484164] ksys_ioctl+0x9b/0xc0 [ 639.487629] __x64_sys_ioctl+0x6f/0xb0 [ 639.491526] do_syscall_64+0xf9/0x670 [ 639.495334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.500525] RIP: 0033:0x45dcc7 [ 639.503723] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 639.522635] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 639.530345] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 639.537616] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 639.544886] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 639.552157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 639.559432] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 639.588606] BTRFS error (device loop5): open_ctree failed 12:30:12 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003000000530000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 639.639740] BTRFS error (device loop1): superblock checksum mismatch 12:30:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1f00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8502000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 639.699680] BTRFS error (device loop1): open_ctree failed 12:30:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8503000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:12 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) r5 = socket(0x23, 0x5, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={r4, 0x7, 0x200}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x1000000c00) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r7, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r6, 0x0, 0x100000, 0x0) 12:30:12 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:12 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000037ffffffe0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 640.036170] BTRFS info (device loop5): enabling free space tree [ 640.051438] BTRFS info (device loop5): using free space tree [ 640.070656] BTRFS info (device loop5): has skinny extents [ 640.072661] FAULT_INJECTION: forcing a failure. 12:30:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8504000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 640.072661] name failslab, interval 1, probability 0, space 0, times 0 [ 640.089820] CPU: 1 PID: 9994 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 640.097653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.107012] Call Trace: [ 640.109615] dump_stack+0x22c/0x33e [ 640.113262] should_fail.cold+0xa/0x2f [ 640.117167] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 640.122296] __should_failslab+0x153/0x1b6 [ 640.126545] should_failslab+0x5/0xf [ 640.130270] kmem_cache_alloc+0x2b1/0x4a0 12:30:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8505000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 640.134442] __kernfs_new_node+0xd2/0x680 [ 640.138606] ? kernfs_find_ns+0x370/0x370 [ 640.142773] ? __mutex_unlock_slowpath+0xea/0x660 [ 640.147653] ? __mutex_add_waiter+0x160/0x160 [ 640.152159] ? kernfs_next_descendant_post+0x19c/0x290 [ 640.157553] kernfs_new_node+0x92/0x120 [ 640.161553] __kernfs_create_file+0x51/0x33f [ 640.165979] sysfs_add_file_mode_ns+0x226/0x540 [ 640.170679] internal_create_group+0x355/0xba0 [ 640.175280] ? sysfs_remove_link_from_group+0x70/0x70 [ 640.180480] ? lock_downgrade+0x750/0x750 12:30:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8506000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 640.184657] lo_ioctl+0xf87/0x2200 [ 640.188214] ? loop_set_status64+0x110/0x110 [ 640.192636] blkdev_ioctl+0x5cb/0x1a7e [ 640.196532] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.201910] ? blkpg_ioctl+0x9c0/0x9c0 [ 640.205808] ? mark_held_locks+0xf0/0xf0 [ 640.209873] ? find_held_lock+0x2d/0x110 [ 640.213950] ? debug_check_no_obj_freed+0x201/0x482 [ 640.218995] block_ioctl+0xe9/0x130 [ 640.222640] ? blkdev_fallocate+0x3f0/0x3f0 [ 640.226991] do_vfs_ioctl+0xcdb/0x12e0 [ 640.230902] ? selinux_file_ioctl+0x44f/0x5e0 12:30:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8510000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 640.235414] ? ioctl_preallocate+0x200/0x200 [ 640.239839] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 640.245304] ? __fget+0x3ad/0x570 [ 640.248769] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 640.253012] ? putname+0xe1/0x130 [ 640.256489] ksys_ioctl+0x9b/0xc0 [ 640.259959] __x64_sys_ioctl+0x6f/0xb0 [ 640.263863] do_syscall_64+0xf9/0x670 [ 640.268198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.273396] RIP: 0033:0x45dcc7 12:30:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8511000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 640.276599] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 640.295510] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 640.303236] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 640.310521] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 640.317806] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 640.325086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 640.332465] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 640.410622] attempt to access beyond end of device [ 640.418192] loop5: rw=4096, want=2064, limit=267 [ 640.433650] BTRFS error (device loop5): failed to read chunk root [ 640.502503] BTRFS error (device loop5): open_ctree failed [ 640.542870] BTRFS error (device loop1): superblock checksum mismatch [ 640.575702] BTRFS error (device loop1): open_ctree failed [ 640.612492] BTRFS error (device loop1): superblock checksum mismatch [ 640.639807] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 12:30:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500030000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:13 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030002000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 640.725575] BTRFS error (device loop1): open_ctree failed 12:30:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:13 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:13 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r7, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x140e, 0x300, 0x70bd2b, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x4}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x1}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:30:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8580040000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 640.889083] FAULT_INJECTION: forcing a failure. [ 640.889083] name failslab, interval 1, probability 0, space 0, times 0 [ 640.902584] CPU: 0 PID: 10070 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 640.910497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.919983] Call Trace: [ 640.922569] dump_stack+0x22c/0x33e [ 640.926188] should_fail.cold+0xa/0x2f [ 640.930061] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 640.935153] __should_failslab+0x153/0x1b6 [ 640.939376] should_failslab+0x5/0xf [ 640.943193] kmem_cache_alloc+0x2b1/0x4a0 [ 640.947337] __kernfs_new_node+0xd2/0x680 [ 640.951568] ? kernfs_find_ns+0x370/0x370 [ 640.955721] ? __mutex_unlock_slowpath+0xea/0x660 [ 640.960685] ? __mutex_add_waiter+0x160/0x160 [ 640.965169] ? kernfs_next_descendant_post+0x19c/0x290 [ 640.970444] kernfs_new_node+0x92/0x120 [ 640.974419] __kernfs_create_file+0x51/0x33f [ 640.978841] sysfs_add_file_mode_ns+0x226/0x540 [ 640.983504] internal_create_group+0x355/0xba0 [ 640.988098] ? sysfs_remove_link_from_group+0x70/0x70 [ 640.993330] ? lock_downgrade+0x750/0x750 [ 640.997483] lo_ioctl+0xf87/0x2200 [ 641.001013] ? loop_set_status64+0x110/0x110 [ 641.005522] blkdev_ioctl+0x5cb/0x1a7e [ 641.009506] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.014862] ? blkpg_ioctl+0x9c0/0x9c0 [ 641.018742] ? mark_held_locks+0xf0/0xf0 [ 641.022922] ? find_held_lock+0x2d/0x110 [ 641.027163] ? debug_check_no_obj_freed+0x201/0x482 [ 641.032354] block_ioctl+0xe9/0x130 [ 641.035969] ? blkdev_fallocate+0x3f0/0x3f0 [ 641.040339] do_vfs_ioctl+0xcdb/0x12e0 [ 641.044228] ? selinux_file_ioctl+0x44f/0x5e0 [ 641.048731] ? ioctl_preallocate+0x200/0x200 [ 641.053125] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 641.058579] ? __fget+0x3ad/0x570 [ 641.062033] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 641.066252] ? putname+0xe1/0x130 [ 641.069695] ksys_ioctl+0x9b/0xc0 [ 641.073135] __x64_sys_ioctl+0x6f/0xb0 [ 641.077010] do_syscall_64+0xf9/0x670 [ 641.080817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.085992] RIP: 0033:0x45dcc7 [ 641.089169] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 641.108076] RSP: 002b:00007f0fa8cc5a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 641.115770] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 641.123024] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 641.130276] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 12:30:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500050000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 641.137532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 641.144786] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 12:30:14 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030003000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 641.200971] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 641.223130] BTRFS error (device loop1): superblock checksum mismatch [ 641.243689] BTRFS error (device loop1): open_ctree failed 12:30:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500060000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:14 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 641.263159] BTRFS error (device loop1): superblock checksum mismatch [ 641.281760] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 12:30:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2200, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500110000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 641.438134] BTRFS error (device loop1): open_ctree failed 12:30:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85001f0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 641.590583] BTRFS info (device loop5): enabling free space tree [ 641.635269] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 641.646657] BTRFS info (device loop5): using free space tree [ 641.683767] BTRFS info (device loop5): has skinny extents [ 641.896616] attempt to access beyond end of device [ 641.901753] loop5: rw=4096, want=2064, limit=267 [ 641.918172] BTRFS error (device loop5): failed to read chunk root [ 641.951544] BTRFS error (device loop5): open_ctree failed [ 641.967052] BTRFS info (device loop5): disk space caching is enabled [ 641.978242] BTRFS info (device loop5): has skinny extents 12:30:14 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x90, 0x1405, 0x300, 0x70bd26, 0x25dfdbfe, "", [{{0x8, 0x1, 0x1}, {0x8, 0x3, 0x1}}, {{0x8, 0x1, 0x2}, {0x8, 0x3, 0x403}}, {{0x8, 0x1, 0x2}, {0x8}}, {{0xfffffffffffffeb2, 0x1, 0x2}, {0x8}}, {{0x8, 0x1, 0x1}, {0x8}}, {{0x8}, {0x8, 0x3, 0x1}}, {{0x8}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x45, 0x3, 0x3}}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) setsockopt$inet_udp_int(r5, 0x11, 0x67, &(0x7f00000001c0)=0x7ff, 0x4) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:30:14 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030004000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500200000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 642.092991] attempt to access beyond end of device [ 642.098763] loop5: rw=4096, want=2064, limit=267 12:30:14 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030005000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85003f0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 642.130830] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 642.144158] BTRFS error (device loop5): failed to read chunk root [ 642.232266] BTRFS error (device loop5): open_ctree failed 12:30:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8504800000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:15 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030006000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 642.339580] BTRFS error (device loop1): superblock checksum mismatch [ 642.352450] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 12:30:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x2c00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 642.465514] BTRFS error (device loop1): open_ctree failed 12:30:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x11000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 642.719924] BTRFS info (device loop5): enabling free space tree [ 642.748812] BTRFS info (device loop5): using free space tree [ 642.758310] BTRFS info (device loop5): has skinny extents [ 642.861471] attempt to access beyond end of device [ 642.867141] loop5: rw=4096, want=2064, limit=267 [ 642.872301] BTRFS error (device loop5): failed to read chunk root [ 642.923070] BTRFS error (device loop5): open_ctree failed 12:30:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e856b6b6b00000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:15 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030007000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x1f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) 12:30:15 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}]}, 0x1c}}, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, r7, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}, @GTPA_VERSION={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r8, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) [ 643.021814] BTRFS info (device loop5): enabling free space tree [ 643.045080] BTRFS info (device loop5): using free space tree [ 643.065165] BTRFS info (device loop5): has skinny extents [ 643.071766] f2fs_msg: 80 callbacks suppressed [ 643.071779] F2FS-fs (loop3): Invalid log sectors per block(458755) log sectorsize(9) [ 643.078794] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 643.088246] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:30:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000001000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 643.120838] F2FS-fs (loop3): Unable to read 2th superblock [ 643.128011] F2FS-fs (loop3): Invalid log sectors per block(458755) log sectorsize(9) [ 643.138443] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 643.151256] BTRFS error (device loop5): open_ctree failed [ 643.160281] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) 12:30:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3f00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 643.169736] BTRFS info (device loop5): disk space caching is enabled [ 643.173394] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 643.192635] BTRFS info (device loop5): has skinny extents [ 643.199455] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:30:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000002000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 643.312229] F2FS-fs (loop3): Invalid log sectors per block(458755) log sectorsize(9) [ 643.324392] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000003000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 643.355814] F2FS-fs (loop3): Unable to read 2th superblock 12:30:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x4000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:16 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030009000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 643.425972] attempt to access beyond end of device [ 643.431341] loop5: rw=4096, want=2064, limit=267 [ 643.444715] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 643.462088] BTRFS error (device loop5): failed to read chunk root 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000004000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000005000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 643.515497] BTRFS error (device loop5): open_ctree failed 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000006000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 643.670935] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 [ 643.690970] BTRFS error (device loop1): superblock checksum mismatch [ 643.705626] BTRFS error (device loop1): open_ctree failed [ 643.713476] BTRFS error (device loop1): superblock checksum mismatch 12:30:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 643.773349] BTRFS error (device loop1): open_ctree failed 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000010000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:16 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003000a000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:16 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x12080, 0x0) pwritev2(r5, &(0x7f0000001500)=[{&(0x7f0000000040)="71b08ecc441082d76c6af5d846fc53ea59afd5b7072100cb16aabe27c32e5fe2da492875400231a4d8ce862e9793462d79b3bbe7341104edff96e6c3aa07966ace4636db14ce1bea0f5417541dd1625aadfd97efcfa213f91309aa11b44d1e44c1dabe8b4fd61502bb0d3bab4c9bac1a11e77d14a56d83cf53af99f2dc4b1699b0bd27712504317e005d7539752af4034c03f91c69da8c8fbd95e474366623", 0x9f}, {&(0x7f0000001640)="e27f8bbb012e690b325f111a3c052dd1b2ce19ed43d7308c1f6b86dfe5301f1f185ff53ee4b486a1513c83e1e37eaa75be86722453e6a3069eb343127ba69c3248e352a3dfaf3c7898a32152b51ef7b2e8a7ce705d8db02ce944ccfe87d51ca4206a038a53c228db4bf142c745f2e20892d6a279298c848d0daba20a42a3ac2c81b7c15094207006b6534136a058cedc982dd0f262318a0e3605282679d6bbd89f42d13194f517da24c8f579313f6474e8f5b6aa2a5d4e96e05092a2f14b5d2a485bc7d3ffd405d2bb220c8472678b77dd6a80bb877ced786c3edfad21b266f43c851ef46783f00c3c49fd8992715210aa61d0b6", 0xf4}, {&(0x7f0000000140)="4de6f23dd26e0c1a1d1880dfba6c3fe9dc424dbd6944ccbedb6e713332542da81ce615b9cccafddadfd0ef3c0cf32ce9486f2d571444ed9acbd7fb486edcbad0e2db119f5facdeb7284cebf1ea12b02acf84a7cfa9e9", 0x56}, {&(0x7f00000018c0)="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", 0x15e}, {&(0x7f0000000400)="8297c7436f274de68d4afb33e24f7dc89f157fc4fa7e516c674db0b3ed1e6cb15f5f4a73a704d226da9b6521dc719722e16619d6cfe65094f4", 0x39}, {&(0x7f0000001580)="ecbf2feba16150a5ce399999e8e91cb31e5eab185cc284af2f0f5a8fc889600d420cdbeb05c6099ae35cd29cecc8d5ecd54b91e3dd2d06149f5ad8a1e14ebd69795fb93f89461a0d2f2cc92a9dc23bd879460c5a90e6ba0af606ffddb51c2d2a9110b7e1ff62ea884e554c1eab505f1eb9e73415dd10e1e15802d63608e098e20ddbae91350dd55f71", 0x89}, {&(0x7f0000000500)="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", 0x1000}], 0x7, 0x260b, 0x4, 0x16) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_EDID(r9, 0xc0285628, &(0x7f0000000200)={0x0, 0x4466, 0x1, [], &(0x7f00000001c0)=0xa3}) socket(0x2b, 0x800, 0x44) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0xfffd, 0x0, @dev={0xfe, 0x80, [], 0x36}, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x4240a2a0) socket$l2tp(0x2, 0x2, 0x73) 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000011000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000001f000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000020000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 644.061598] BTRFS error (device loop1): superblock checksum mismatch [ 644.085208] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop1 new:/dev/loop5 12:30:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000003f000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85006b6b6b000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 644.185375] BTRFS error (device loop1): open_ctree failed 12:30:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000480000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:17 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003000c000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85ffffffeb000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 644.375417] BTRFS info (device loop5): enabling free space tree [ 644.381538] BTRFS info (device loop5): using free space tree [ 644.389507] BTRFS info (device loop5): has skinny extents [ 644.414995] BTRFS error (device loop5): open_ctree failed 12:30:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6400, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 644.422465] BTRFS info (device loop5): disk space caching is enabled [ 644.433561] BTRFS info (device loop5): has skinny extents [ 644.481882] attempt to access beyond end of device [ 644.487205] loop5: rw=4096, want=2064, limit=267 [ 644.492667] BTRFS error (device loop5): failed to read chunk root [ 644.591879] BTRFS error (device loop5): open_ctree failed [ 644.664012] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 644.689337] BTRFS info (device loop5): enabling free space tree [ 644.697155] BTRFS info (device loop5): using free space tree [ 644.712752] BTRFS info (device loop5): has skinny extents 12:30:17 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0xffff0001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3c}}, 0x0, 0xffff}, 0x90) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) 12:30:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffff6000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:17 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030010000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x6b6b6b00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 644.835134] BTRFS error (device loop5): open_ctree failed [ 644.876945] BTRFS error (device loop1): superblock checksum mismatch [ 644.887824] BTRFS error (device loop1): open_ctree failed [ 644.896694] BTRFS error (device loop1): superblock checksum mismatch [ 644.921887] BTRFS error (device loop1): open_ctree failed 12:30:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x7102, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:17 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030022000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffdfc000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffffe000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fcfdffff000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85ebffffff000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x80040000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) [ 645.202471] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 645.219642] BTRFS info (device loop5): enabling free space tree [ 645.241676] BTRFS info (device loop5): using free space tree [ 645.266678] BTRFS info (device loop5): has skinny extents [ 645.283806] attempt to access beyond end of device [ 645.293389] loop5: rw=4096, want=2064, limit=267 [ 645.300326] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 [ 645.342577] BTRFS error (device loop5): failed to read chunk root [ 645.407505] BTRFS error (device loop5): open_ctree failed [ 645.433191] BTRFS info (device loop5): disk space caching is enabled [ 645.482334] BTRFS info (device loop5): has skinny extents [ 645.740288] attempt to access beyond end of device [ 645.746218] loop5: rw=4096, want=2064, limit=267 [ 645.751405] BTRFS error (device loop5): failed to read chunk root 12:30:18 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030023000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) 12:30:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f6ffffff000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 12:30:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x7202, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000880)={[{@space_cache_v2='space_cache=v2'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:30:18 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket(0x23, 0x5, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, 0x0, 0x0) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="f507000000000000000026"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r7, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x120, r8, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0xffffffff}}, {0x8, 0xb, 0x1000}, {0x6, 0x11, 0x86da}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x81}, {0x6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x8000}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x1d}, {0x6, 0x11, 0x7}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x5d9}, {0x6, 0x11, 0x4}}]}, 0x120}, 0x1, 0x0, 0x0, 0x1}, 0x814) socket$nl_xfrm(0x10, 0x3, 0x6) connect$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) sendmsg$AUDIT_SET(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x3e9, 0x200, 0x70bd2d, 0x25dfdbfb, {0x44, 0x1, 0x0, 0xffffffffffffffff, 0x2400, 0x8, 0xfffffffd, 0x9, 0x0, 0x6}, ["", "", ""]}, 0x38}}, 0x40) splice(r0, 0x0, r5, 0x0, 0x100000, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0xffffffff) 12:30:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85feffffff000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 645.856173] BTRFS error (device loop5): open_ctree failed 12:30:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000200000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 645.998062] BTRFS info (device loop5): enabling free space tree [ 646.009050] BTRFS warning (device ): duplicate device fsid:devid for f90cac8b-044b-4fa8-8bee-4b8d3da88dc2:1 old:/dev/loop5 new:/dev/loop1 12:30:18 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b000900000003002c000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000580)) [ 646.049488] BTRFS info (device