eadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 218.941801] ptrace attach of "/root/syz-executor.2"[8519] was attempted by "/root/syz-executor.2"[8521] 11:05:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 218.997977] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 219.016343] EXT4-fs (loop4): failed to parse options in superblock: L [ 219.023932] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 219.033939] EXT4-fs (loop4): group descriptors corrupted! 11:05:34 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 219.142244] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 219.152106] EXT4-fs (loop4): failed to parse options in superblock: L [ 219.165579] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 219.181037] EXT4-fs (loop4): group descriptors corrupted! 11:05:37 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket(0x10, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) close(r2) 11:05:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:05:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 221.901832] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 221.921971] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 [ 221.934080] EXT4-fs (loop4): failed to parse options in superblock: L 11:05:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 221.974639] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 221.991262] EXT4-fs (loop4): group descriptors corrupted! [ 221.995918] BTRFS error (device loop2): superblock checksum mismatch 11:05:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 222.056783] BTRFS error (device loop2): open_ctree failed [ 222.089864] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 222.097482] EXT4-fs (loop4): failed to parse options in superblock: L 11:05:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 222.115986] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 222.137620] EXT4-fs (loop4): group descriptors corrupted! [ 222.154179] BTRFS error (device loop2): superblock checksum mismatch [ 222.211493] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 222.231850] EXT4-fs (loop4): failed to parse options in superblock: L [ 222.239242] BTRFS error (device loop2): open_ctree failed [ 222.245487] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 222.255018] EXT4-fs (loop4): group descriptors corrupted! [ 222.328743] print_req_error: I/O error, dev loop2, sector 0 11:05:40 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket(0x10, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:05:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 224.901586] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 224.908915] EXT4-fs (loop4): failed to parse options in superblock: L [ 224.917414] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 224.928522] BTRFS error (device loop2): superblock checksum mismatch [ 224.934464] EXT4-fs (loop4): group descriptors corrupted! 11:05:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket(0x10, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0), 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0), 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 224.957485] ptrace attach of "/root/syz-executor.0"[8635] was attempted by "/root/syz-executor.0"[8636] 11:05:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 225.035415] BTRFS error (device loop2): open_ctree failed [ 225.079549] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 225.087536] EXT4-fs (loop4): failed to parse options in superblock: L [ 225.094946] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 225.115144] EXT4-fs (loop4): group descriptors corrupted! 11:05:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:05:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0), 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 227.788951] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 227.796423] EXT4-fs (loop4): failed to parse options in superblock: L [ 227.803861] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 227.814684] EXT4-fs (loop4): group descriptors corrupted! [ 227.827061] BTRFS error (device loop2): superblock checksum mismatch [ 227.885161] BTRFS error (device loop2): open_ctree failed 11:05:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 227.934549] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 227.948135] EXT4-fs (loop4): failed to parse options in superblock: L 11:05:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket(0x10, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:05:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 227.999840] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 228.030210] EXT4-fs (loop4): group descriptors corrupted! 11:05:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 228.090729] BTRFS error (device loop2): superblock checksum mismatch [ 228.129286] BTRFS error (device loop2): open_ctree failed 11:05:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 228.160948] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 228.175291] EXT4-fs (loop4): failed to parse options in superblock: L [ 228.183035] print_req_error: I/O error, dev loop2, sector 0 [ 228.195692] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 228.219101] EXT4-fs (loop4): group descriptors corrupted! 11:05:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:46 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:05:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 230.853849] EXT4-fs (loop4): Unrecognized mount option "L" or missing value [ 230.861243] EXT4-fs (loop4): failed to parse options in superblock: L [ 230.868870] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 230.882169] EXT4-fs (loop4): group descriptors corrupted! 11:05:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 230.902661] print_req_error: I/O error, dev loop2, sector 0 11:05:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:46 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:05:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:46 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 231.067330] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 231.078285] EXT4-fs (loop4): filesystem is read-only [ 231.095236] print_req_error: I/O error, dev loop2, sector 0 [ 231.101381] EXT4-fs (loop4): Can't read superblock on 2nd try [ 231.216909] print_req_error: I/O error, dev loop2, sector 0 11:05:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:05:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 233.877050] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 233.898519] EXT4-fs (loop4): filesystem is read-only [ 233.917577] EXT4-fs (loop4): Can't read superblock on 2nd try [ 233.939031] print_req_error: I/O error, dev loop2, sector 0 [ 233.961616] print_req_error: I/O error, dev loop4, sector 0 [ 233.968131] Buffer I/O error on dev loop4, logical block 0, async page read 11:05:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:05:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 234.119271] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended 11:05:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 234.160980] EXT4-fs (loop4): filesystem is read-only 11:05:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) [ 234.192106] EXT4-fs (loop4): Can't read superblock on 2nd try 11:05:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) 11:05:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) [ 237.114124] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 237.131464] EXT4-fs (loop4): filesystem is read-only 11:05:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 237.181170] EXT4-fs (loop4): Can't read superblock on 2nd try 11:05:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7, 0x0) 11:05:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) 11:05:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7, 0x0) [ 237.337783] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 237.381415] EXT4-fs (loop4): filesystem is read-only [ 237.402168] EXT4-fs (loop4): Can't read superblock on 2nd try 11:05:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) 11:05:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7, 0x0) 11:05:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) 11:05:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x7, 0x0) [ 240.123794] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 240.132317] EXT4-fs (loop4): filesystem is read-only [ 240.138420] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 240.151461] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 240.220013] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 240.236084] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) 11:05:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:05:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x7, 0x0) 11:05:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 240.272059] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 240.304445] print_req_error: I/O error, dev loop2, sector 0 11:05:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 240.385323] print_req_error: I/O error, dev loop2, sector 0 [ 240.470549] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 240.483701] EXT4-fs (loop4): filesystem is read-only [ 240.489872] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 240.502836] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 240.512296] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 240.536878] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) [ 240.556953] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:05:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x7, 0x0) 11:05:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:05:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) [ 243.166777] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 243.175402] EXT4-fs (loop4): filesystem is read-only [ 243.181587] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 11:05:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) [ 243.215569] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 243.229961] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 243.255312] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) 11:05:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 11:05:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) 11:05:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 243.325828] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:05:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}]}, 0x40}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:05:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:05:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:05:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 11:05:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) 11:05:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:05:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:05:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 243.564650] EXT4-fs (loop4): Unrecognized mount option "@" or missing value [ 243.588865] EXT4-fs (loop4): failed to parse options in superblock: @ [ 243.611847] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 243.642086] EXT4-fs (loop4): filesystem is read-only [ 243.659759] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 11:05:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x24}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:05:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) 11:05:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 243.685926] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 243.695342] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 243.705325] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) [ 243.726527] EXT4-fs (loop4): mounted filesystem without journal. Opts: @; ,errors=continue 11:05:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:05:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 243.906050] EXT4-fs (loop4): Unrecognized mount option "$" or missing value [ 243.917847] EXT4-fs (loop4): failed to parse options in superblock: $ [ 243.928180] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 243.962934] EXT4-fs (loop4): filesystem is read-only [ 243.969837] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 243.983654] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 243.992784] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 11:05:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) 11:05:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 244.007171] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) [ 244.028291] EXT4-fs (loop4): mounted filesystem without journal. Opts: $; ,errors=continue 11:05:59 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) [ 244.197019] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 244.210590] EXT4-fs (loop4): failed to parse options in superblock:  [ 244.217734] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 244.228850] print_req_error: I/O error, dev loop2, sector 0 [ 244.259386] EXT4-fs (loop4): filesystem is read-only [ 244.270974] ptrace attach of "/root/syz-executor.3"[9172] was attempted by "/root/syz-executor.3"[9175] [ 244.290558] ptrace attach of "/root/syz-executor.1"[9174] was attempted by "/root/syz-executor.1"[9177] [ 244.303781] ptrace attach of "/root/syz-executor.0"[9173] was attempted by "/root/syz-executor.0"[9176] [ 244.307409] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 244.334526] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 244.344966] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 11:05:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x7, 0x0) [ 244.354988] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) [ 244.386849] EXT4-fs (loop4): mounted filesystem without journal. Opts: ; ,errors=continue 11:05:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:05:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:59 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:05:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:05:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x7, 0x0) [ 244.491910] ptrace attach of "/root/syz-executor.3"[9200] was attempted by "/root/syz-executor.3"[9203] [ 244.495182] ptrace attach of "/root/syz-executor.0"[9198] was attempted by "/root/syz-executor.0"[9205] [ 244.504498] ptrace attach of "/root/syz-executor.1"[9201] was attempted by "/root/syz-executor.1"[9204] 11:06:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 244.587772] ptrace attach of "/root/syz-executor.1"[9212] was attempted by "/root/syz-executor.1"[9215] [ 244.606654] ptrace attach of "/root/syz-executor.0"[9214] was attempted by "/root/syz-executor.0"[9218] [ 244.679975] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 244.687909] EXT4-fs (loop4): failed to parse options in superblock:  [ 244.695450] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 244.704624] EXT4-fs (loop4): filesystem is read-only [ 244.710278] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 244.719717] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 244.736156] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 244.745425] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) [ 244.768479] EXT4-fs (loop4): mounted filesystem without journal. Opts: ; ,errors=continue 11:06:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:06:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:06:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x7, 0x0) 11:06:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:06:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x7, 0x0) 11:06:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x7, 0x0) [ 244.945451] print_req_error: I/O error, dev loop2, sector 0 [ 244.948300] EXT4-fs (loop4): unsupported inode size: 12336 [ 244.979503] EXT4-fs (loop4): blocksize: 4096 11:06:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:06:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:06:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) [ 245.149680] EXT4-fs (loop4): unsupported inode size: 12336 [ 245.155625] EXT4-fs (loop4): blocksize: 4096 [ 245.161003] print_req_error: I/O error, dev loop2, sector 0 11:06:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x7, 0x0) 11:06:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 245.539837] EXT4-fs (loop4): unsupported inode size: 12336 [ 245.545838] EXT4-fs (loop4): blocksize: 4096 [ 245.555459] print_req_error: I/O error, dev loop2, sector 0 11:06:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:06:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x7, 0x0) 11:06:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:06:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) [ 245.718194] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 245.732067] EXT4-fs (loop4): failed to parse options in superblock:  [ 245.744455] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended 11:06:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x7, 0x0) [ 245.763524] print_req_error: I/O error, dev loop2, sector 0 [ 245.793253] EXT4-fs (loop4): filesystem is read-only [ 245.812526] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 11:06:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) [ 245.839647] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 245.849997] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 245.860461] print_req_error: I/O error, dev loop2, sector 0 [ 245.860665] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) 11:06:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x7, 0x0) [ 245.887395] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: bogus i_mode (30060) [ 245.915909] EXT4-fs (loop4): get root inode failed [ 245.939565] EXT4-fs (loop4): mount failed [ 245.965269] print_req_error: I/O error, dev loop2, sector 0 11:06:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 11:06:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x7, 0x0) [ 246.385217] print_req_error: I/O error, dev loop2, sector 0 11:06:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:06:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0x4}}]}, 0x34}}, 0x0) 11:06:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x7, 0x0) 11:06:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 246.552061] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 246.559941] EXT4-fs (loop4): failed to parse options in superblock:  [ 246.570701] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 246.580116] EXT4-fs (loop4): filesystem is read-only 11:06:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x7, 0x0) 11:06:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 246.603567] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 246.618061] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 246.628119] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 11:06:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 246.646372] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) [ 246.656981] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: bogus i_mode (30060) [ 246.675148] EXT4-fs (loop4): get root inode failed [ 246.680460] EXT4-fs (loop4): mount failed 11:06:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) [ 246.719779] print_req_error: I/O error, dev loop2, sector 0 [ 246.864174] print_req_error: I/O error, dev loop2, sector 0 11:06:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:06:02 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) r6 = dup(r5) syz_kvm_setup_cpu$x86(r6, r4, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x19, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 247.177813] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 247.185900] EXT4-fs (loop4): failed to parse options in superblock:  [ 247.200696] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 247.230761] EXT4-fs (loop4): filesystem is read-only [ 247.249342] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 247.268751] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 247.289592] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 247.302228] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 247.313813] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (24389!=0) 11:06:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) 11:06:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 247.335241] EXT4-fs error (device loop4): ext4_fill_super:4365: inode #2: comm syz-executor.4: iget: bogus i_mode (30060) 11:06:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 247.402726] EXT4-fs (loop4): get root inode failed 11:06:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) 11:06:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 247.436513] EXT4-fs (loop4): mount failed 11:06:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4810, 0x0) 11:06:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:03 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) r6 = dup(r5) syz_kvm_setup_cpu$x86(r6, r4, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x19, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 11:06:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x7, 0x0) 11:06:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4810, 0x0) 11:06:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4810, 0x0) 11:06:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x7, 0x0) 11:06:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x7, 0x0) 11:06:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:03 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) r6 = dup(r5) syz_kvm_setup_cpu$x86(r6, r4, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x19, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 11:06:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4810, 0x0) [ 247.868045] print_req_error: I/O error, dev loop4, sector 0 [ 248.014284] print_req_error: I/O error, dev loop4, sector 0 11:06:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4810, 0x0) 11:06:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:06 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) r6 = dup(r5) syz_kvm_setup_cpu$x86(r6, r4, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x19, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 11:06:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4810, 0x0) [ 250.712776] print_req_error: I/O error, dev loop4, sector 0 11:06:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4810, 0x0) [ 250.765321] print_req_error: I/O error, dev loop2, sector 0 11:06:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4810, 0x0) [ 250.901244] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 250.966928] print_req_error: I/O error, dev loop2, sector 0 [ 251.029282] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:06 executing program 2: sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mknod$loop(0x0, 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x0, 0xff}}, 0x50) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) ptrace$getregset(0x4207, 0x0, 0x0, 0x0) 11:06:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4810, 0x0) [ 251.203660] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 251.241711] syz-executor.5 (9604) used greatest stack depth: 23712 bytes left 11:06:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x4810, 0x0) 11:06:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x4810, 0x0) [ 253.719802] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 253.739176] BTRFS error (device loop2): superblock checksum mismatch [ 253.802725] BTRFS error (device loop2): open_ctree failed 11:06:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x4810, 0x0) [ 253.878279] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 253.982098] BTRFS error (device loop2): superblock checksum mismatch [ 254.021902] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x400}], 0x4810, 0x0) [ 254.062109] BTRFS error (device loop2): open_ctree failed 11:06:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 254.189494] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x400}], 0x4810, 0x0) [ 254.247592] BTRFS error (device loop2): superblock checksum mismatch [ 254.342805] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 254.348866] BTRFS error (device loop2): open_ctree failed 11:06:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x400}], 0x4810, 0x0) 11:06:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 256.757414] BTRFS error (device loop2): superblock checksum mismatch [ 256.788135] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 256.807996] BTRFS error (device loop2): open_ctree failed 11:06:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x4810, 0x0) 11:06:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 256.963685] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 256.999776] BTRFS error (device loop2): superblock checksum mismatch 11:06:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x4810, 0x0) [ 257.009300] print_req_error: I/O error, dev loop4, sector 0 [ 257.015904] Buffer I/O error on dev loop4, logical block 0, async page read [ 257.065884] BTRFS error (device loop2): open_ctree failed 11:06:12 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 257.121948] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x4810, 0x0) [ 257.245045] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 257.294663] print_req_error: I/O error, dev loop4, sector 0 [ 257.300491] Buffer I/O error on dev loop4, logical block 0, async page read [ 257.302446] print_req_error: I/O error, dev loop2, sector 0 11:06:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:15 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002", 0x1d, 0x400}], 0x4810, 0x0) 11:06:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:15 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 259.797835] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002", 0x1d, 0x400}], 0x4810, 0x0) 11:06:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) socket(0x1000000010, 0x80002, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 259.946306] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002", 0x1d, 0x400}], 0x4810, 0x0) [ 260.100429] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) socket(0x1000000010, 0x80002, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000", 0x2c, 0x400}], 0x4810, 0x0) 11:06:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) socket(0x1000000010, 0x80002, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 262.820517] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000", 0x2c, 0x400}], 0x4810, 0x0) 11:06:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 262.863397] print_req_error: I/O error, dev loop2, sector 0 [ 262.869351] print_req_error: I/O error, dev loop4, sector 0 [ 262.875486] Buffer I/O error on dev loop4, logical block 0, async page read 11:06:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000", 0x2c, 0x400}], 0x4810, 0x0) [ 262.946383] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) [ 263.049884] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 263.092844] print_req_error: I/O error, dev loop4, sector 0 [ 263.098669] Buffer I/O error on dev loop4, logical block 0, async page read 11:06:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) 11:06:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe", 0x33, 0x400}], 0x4810, 0x0) 11:06:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) [ 265.849497] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe", 0x33, 0x400}], 0x4810, 0x0) 11:06:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 265.892167] print_req_error: I/O error, dev loop4, sector 0 [ 265.898061] Buffer I/O error on dev loop4, logical block 0, async page read 11:06:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7, 0x0) [ 265.963562] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 266.001891] print_req_error: I/O error, dev loop4, sector 0 11:06:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe", 0x33, 0x400}], 0x4810, 0x0) [ 266.007667] Buffer I/O error on dev loop4, logical block 0, async page read [ 266.128470] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7, 0x0) 11:06:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x4810, 0x0) 11:06:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7, 0x0) [ 268.869547] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x4810, 0x0) 11:06:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x7, 0x0) 11:06:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x4810, 0x0) [ 269.066728] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x7, 0x0) [ 269.164800] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 269.211386] print_req_error: I/O error, dev loop4, sector 0 [ 269.217197] Buffer I/O error on dev loop4, logical block 0, async page read [ 269.233603] print_req_error: I/O error, dev loop2, sector 0 [ 269.667481] syz-executor.5 (10019) used greatest stack depth: 23520 bytes left 11:06:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4810, 0x0) 11:06:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x7, 0x0) 11:06:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 271.886751] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:06:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) 11:06:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4810, 0x0) [ 271.932894] print_req_error: I/O error, dev loop4, sector 0 [ 271.938896] Buffer I/O error on dev loop4, logical block 0, async page read 11:06:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4810, 0x0) 11:06:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) [ 272.058385] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 272.081766] print_req_error: I/O error, dev loop2, sector 0 11:06:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) [ 272.203512] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 272.221335] print_req_error: I/O error, dev loop2, sector 0 11:06:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x4810, 0x0) [ 272.252797] print_req_error: I/O error, dev loop4, sector 0 [ 272.258588] Buffer I/O error on dev loop4, logical block 0, async page read [ 272.359556] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 272.383778] print_req_error: I/O error, dev loop2, sector 0 11:06:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x4810, 0x0) 11:06:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) 11:06:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) 11:06:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x4810, 0x0) [ 274.907188] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 274.935735] print_req_error: I/O error, dev loop2, sector 0 11:06:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) [ 275.050251] print_req_error: I/O error, dev loop2, sector 0 11:06:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x7, 0x0) [ 275.098279] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 275.132165] print_req_error: I/O error, dev loop2, sector 0 11:06:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 11:06:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x7, 0x0) [ 275.236690] EXT4-fs (loop4): Can't read superblock on 2nd try [ 275.281774] print_req_error: I/O error, dev loop4, sector 0 [ 275.287546] Buffer I/O error on dev loop4, logical block 0, async page read 11:06:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 11:06:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x7, 0x0) 11:06:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 277.926590] EXT4-fs (loop4): Can't read superblock on 2nd try 11:06:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 11:06:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x7, 0x0) 11:06:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x7, 0x0) [ 278.098810] EXT4-fs (loop4): Can't read superblock on 2nd try 11:06:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x7, 0x0) [ 278.181095] print_req_error: I/O error, dev loop4, sector 0 [ 278.186925] Buffer I/O error on dev loop4, logical block 0, async page read 11:06:33 executing program 4: 11:06:33 executing program 4: 11:06:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x7, 0x0) 11:06:36 executing program 4: 11:06:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 280.981203] print_req_error: I/O error, dev loop2, sector 0 11:06:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:36 executing program 4: 11:06:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x7, 0x0) 11:06:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2a", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:36 executing program 4: 11:06:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x7, 0x0) 11:06:36 executing program 4: 11:06:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x7, 0x0) [ 281.410683] print_req_error: I/O error, dev loop2, sector 0 11:06:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:39 executing program 4: 11:06:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x7, 0x0) 11:06:39 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:39 executing program 4: 11:06:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x7, 0x0) 11:06:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2a", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:39 executing program 4: 11:06:39 executing program 4: 11:06:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) 11:06:39 executing program 4: [ 284.188791] print_req_error: I/O error, dev loop2, sector 0 [ 284.311134] print_req_error: I/O error, dev loop2, sector 0 11:06:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) 11:06:42 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 287.043645] print_req_error: I/O error, dev loop2, sector 0 11:06:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) 11:06:42 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2a", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x7, 0x0) 11:06:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x7, 0x0) 11:06:42 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x7, 0x0) 11:06:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:45 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 290.028748] BTRFS error (device loop4): superblock checksum mismatch [ 290.119181] BTRFS error (device loop4): open_ctree failed 11:06:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/157, 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:45 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/143, 0x8f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 290.269697] BTRFS error (device loop4): superblock checksum mismatch 11:06:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 290.319824] BTRFS error (device loop4): open_ctree failed 11:06:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 290.439691] print_req_error: I/O error, dev loop2, sector 0 [ 290.545327] BTRFS error (device loop4): superblock checksum mismatch [ 290.589457] BTRFS error (device loop4): open_ctree failed 11:06:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/158, 0x9e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:48 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/157, 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:48 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/143, 0x8f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) [ 293.179471] print_req_error: I/O error, dev loop2, sector 0 11:06:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) 11:06:48 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 293.329873] print_req_error: I/O error, dev loop2, sector 0 [ 293.333642] print_req_error: I/O error, dev loop4, sector 0 11:06:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 293.440104] print_req_error: I/O error, dev loop2, sector 0 [ 293.453401] print_req_error: I/O error, dev loop4, sector 0 11:06:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/158, 0x9e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}]}, 0x4c}}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) 11:06:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 296.130579] EXT4-fs (loop2): Unrecognized mount option "L" or missing value [ 296.150962] print_req_error: I/O error, dev loop4, sector 0 [ 296.164960] EXT4-fs (loop2): failed to parse options in superblock: L [ 296.184282] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 296.194764] EXT4-fs (loop2): group descriptors corrupted! 11:06:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/157, 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:06:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/143, 0x8f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 296.355555] print_req_error: I/O error, dev loop4, sector 0 11:06:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) [ 296.460355] print_req_error: I/O error, dev loop4, sector 0 11:06:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/158, 0x9e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) 11:06:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) 11:06:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cb", 0xb7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f", 0xa7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7, 0x0) 11:06:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7, 0x0) 11:06:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7, 0x0) 11:06:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x7, 0x0) 11:06:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2", 0xb8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x7, 0x0) 11:06:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:06:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x7, 0x0) [ 302.209474] print_req_error: I/O error, dev loop4, sector 0 11:06:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) 11:06:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cb", 0xb7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f", 0xa7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:06:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) [ 302.429077] print_req_error: I/O error, dev loop4, sector 0 11:06:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) [ 302.583583] print_req_error: I/O error, dev loop4, sector 0 11:06:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) [ 302.682803] print_req_error: I/O error, dev loop4, sector 0 11:06:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) 11:07:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2", 0xb8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x7, 0x0) 11:07:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x7, 0x0) [ 305.249464] print_req_error: I/O error, dev loop4, sector 0 11:07:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x7, 0x0) [ 305.319898] print_req_error: I/O error, dev loop4, sector 0 11:07:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cb", 0xb7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f", 0xa7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x7, 0x0) [ 305.394942] print_req_error: I/O error, dev loop4, sector 0 11:07:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x7, 0x0) 11:07:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x7, 0x0) [ 305.488872] print_req_error: I/O error, dev loop4, sector 0 11:07:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x7, 0x0) 11:07:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2", 0xb8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x7, 0x0) 11:07:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x7, 0x0) [ 308.262382] print_req_error: I/O error, dev loop4, sector 0 11:07:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e0209", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x7, 0x0) [ 308.378651] print_req_error: I/O error, dev loop4, sector 0 11:07:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x7, 0x0) 11:07:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x7, 0x0) [ 308.579828] print_req_error: I/O error, dev loop4, sector 0 [ 308.649154] print_req_error: I/O error, dev loop4, sector 0 11:07:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943", 0xc5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x7, 0x0) 11:07:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) 11:07:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 311.296808] print_req_error: I/O error, dev loop4, sector 0 11:07:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e0209", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) 11:07:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 311.441771] print_req_error: I/O error, dev loop4, sector 0 11:07:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) [ 311.580243] print_req_error: I/O error, dev loop4, sector 0 11:07:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x7, 0x0) 11:07:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943", 0xc5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e0209", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x7, 0x0) [ 314.472657] print_req_error: I/O error, dev loop4, sector 0 11:07:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x7, 0x0) 11:07:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x7, 0x0) 11:07:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943", 0xc5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:07:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d19", 0xcb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d1", 0xb9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e", 0xcc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) 11:07:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) 11:07:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d1", 0xb9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d19", 0xcb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) 11:07:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180), 0x0) 11:07:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180), 0x0) 11:07:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e", 0xcc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180), 0x0) 11:07:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d1", 0xb9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d19", 0xcb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x10000}], 0x7, 0x0) 11:07:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) 11:07:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e", 0xcc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) 11:07:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) 11:07:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3", 0xbc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec2", 0xce}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4000, 0x0, @remote, 0x9}], 0x1c) 11:07:22 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:07:22 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 11:07:22 executing program 5: ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000040)={0xbb4, {{0x2, 0x4e20, @local}}, 0x1, 0x5, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e22, @local}}]}, 0x310) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/key-users\x00', 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000003c0)=0x1, 0x4) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNADDRESOURCE(r2, 0x89e0, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000440)={0x0, 0x9, 0x2, 0x4, 0x7fff, 0x8, 0x3fde}, &(0x7f0000000480)={0x7, 0xfffffffffffffffd, 0x100000000, 0xff, 0x2, 0x2, 0x3, 0x80}, &(0x7f00000004c0)={0x3, 0x100, 0x4, 0x5da1, 0x7, 0x4, 0x100000001, 0x3ff}, &(0x7f0000000540)={r3, r4+10000000}, &(0x7f00000005c0)={&(0x7f0000000580)={[0x100000001]}, 0x8}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r5 = openat$mice(0xffffffffffffff9c, &(0x7f0000000600)='/dev/input/mice\x00', 0x341080) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000640)={0x0, 0x5}, &(0x7f0000000680)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f00000006c0)={r6, @in6={{0xa, 0x4e20, 0x6d3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x8, 0x8000}, &(0x7f0000000780)=0x90) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000007c0)='net/snmp6\x00') bind$rxrpc(r7, &(0x7f0000000800)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @multicast2}}, 0x24) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000008c0)={0xfffffff, 0x7, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000880)={0x990a62, 0x1f, [], @p_u16=&(0x7f0000000840)=0x7ff}}) ioctl$VIDIOC_QBUF(r8, 0xc058560f, &(0x7f0000000900)={0x8, 0x2, 0x4, 0x8, 0x22a, {0x77359400}, {0x2, 0x8, 0x40, 0x2, 0x0, 0x81, "c0a09ac8"}, 0x9, 0x1, @userptr=0x3, 0x1}) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000980)='/dev/dlm-control\x00', 0x20000, 0x0) write$FUSE_OPEN(r9, &(0x7f00000009c0)={0x20, 0x0, 0x5, {0x0, 0x3}}, 0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={r6, @in6={{0xa, 0x4e21, 0x100, @dev={0xfe, 0x80, [], 0x16}, 0x3f}}}, 0x84) 11:07:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292", 0xcf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:24 executing program 4 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:24 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 329.593286] FAULT_INJECTION: forcing a failure. [ 329.593286] name failslab, interval 1, probability 0, space 0, times 1 [ 329.608073] CPU: 0 PID: 11327 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 329.616004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.625366] Call Trace: [ 329.628054] dump_stack+0x1b2/0x283 [ 329.631801] should_fail.cold+0x10a/0x154 [ 329.636051] should_failslab+0xd6/0x130 [ 329.640041] __kmalloc+0x2c1/0x400 [ 329.643649] ? SyS_memfd_create+0xb9/0x3a0 [ 329.647903] SyS_memfd_create+0xb9/0x3a0 [ 329.651972] ? shmem_fcntl+0x120/0x120 [ 329.655982] ? SyS_clock_settime+0x1a0/0x1a0 [ 329.660397] ? do_syscall_64+0x4c/0x640 [ 329.664374] ? shmem_fcntl+0x120/0x120 [ 329.668265] do_syscall_64+0x1d5/0x640 [ 329.672224] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 329.677415] RIP: 0033:0x45ca59 [ 329.680600] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:07:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 329.688312] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045ca59 [ 329.695592] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 329.702871] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 329.710152] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 329.717429] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 329.727520] FAULT_INJECTION: forcing a failure. [ 329.727520] name failslab, interval 1, probability 0, space 0, times 1 [ 329.752027] CPU: 1 PID: 11330 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 329.759949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.769311] Call Trace: [ 329.771919] dump_stack+0x1b2/0x283 [ 329.775584] should_fail.cold+0x10a/0x154 [ 329.779752] should_failslab+0xd6/0x130 [ 329.783742] __kmalloc+0x2c1/0x400 [ 329.787414] ? __sctp_setsockopt_connectx+0x103/0x280 [ 329.792750] __sctp_setsockopt_connectx+0x103/0x280 [ 329.797789] sctp_setsockopt+0x2152/0x3be0 [ 329.802126] ? sock_has_perm+0x1c0/0x230 [ 329.806209] ? sctp_setsockopt_paddr_thresholds+0x390/0x390 [ 329.812009] ? lock_acquire+0x170/0x3f0 [ 329.816005] ? lock_downgrade+0x6e0/0x6e0 [ 329.820255] ? selinux_netlbl_socket_setsockopt+0x72/0x300 [ 329.825902] ? selinux_netlbl_sock_rcv_skb+0x3d0/0x3d0 [ 329.831244] ? __fget+0x226/0x360 [ 329.834721] ? selinux_socket_setsockopt+0x60/0x80 [ 329.839803] ? sock_common_setsockopt+0x1e/0xb0 [ 329.844496] SyS_setsockopt+0x110/0x1e0 [ 329.848488] ? SyS_recv+0x40/0x40 [ 329.851959] ? SyS_clock_settime+0x1a0/0x1a0 [ 329.856384] ? do_syscall_64+0x4c/0x640 [ 329.860375] ? SyS_recv+0x40/0x40 [ 329.863848] do_syscall_64+0x1d5/0x640 [ 329.867758] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 329.872960] RIP: 0033:0x45ca59 [ 329.876157] RSP: 002b:00007f5ca011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 329.883897] RAX: ffffffffffffffda RBX: 00000000005055e0 RCX: 000000000045ca59 [ 329.891174] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000005 11:07:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3", 0xbc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:25 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec2", 0xce}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 329.898452] RBP: 000000000078bf00 R08: 000000000000001c R09: 0000000000000000 [ 329.905735] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000006 [ 329.911980] FAULT_INJECTION: forcing a failure. [ 329.911980] name failslab, interval 1, probability 0, space 0, times 0 [ 329.913001] R13: 0000000000000b0d R14: 00000000004d79d8 R15: 00007f5ca01206d4 [ 329.933992] CPU: 0 PID: 11351 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 329.941914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.951286] Call Trace: [ 329.953891] dump_stack+0x1b2/0x283 [ 329.957531] should_fail.cold+0x10a/0x154 [ 329.961697] should_failslab+0xd6/0x130 [ 329.965680] kmem_cache_alloc+0x28e/0x3c0 [ 329.969847] __d_alloc+0x2a/0x9b0 [ 329.973295] ? lock_downgrade+0x6e0/0x6e0 [ 329.977432] __shmem_file_setup.part.0+0xcb/0x3c0 [ 329.982261] ? shmem_rename2+0x6e0/0x6e0 [ 329.986301] ? __alloc_fd+0x1bf/0x490 [ 329.990093] SyS_memfd_create+0x1f6/0x3a0 [ 329.994227] ? shmem_fcntl+0x120/0x120 [ 329.998097] ? SyS_clock_settime+0x1a0/0x1a0 [ 330.002489] ? do_syscall_64+0x4c/0x640 [ 330.006453] ? shmem_fcntl+0x120/0x120 [ 330.010334] do_syscall_64+0x1d5/0x640 [ 330.014210] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 330.019388] RIP: 0033:0x45ca59 [ 330.022564] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 330.030265] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045ca59 [ 330.037524] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 330.044778] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 11:07:25 executing program 4 (fault-call:6 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:25 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 330.052032] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 330.059293] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 330.123154] FAULT_INJECTION: forcing a failure. [ 330.123154] name failslab, interval 1, probability 0, space 0, times 0 [ 330.134164] FAULT_INJECTION: forcing a failure. [ 330.134164] name failslab, interval 1, probability 0, space 0, times 0 [ 330.134798] CPU: 1 PID: 11355 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0 [ 330.153863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.163225] Call Trace: [ 330.165818] dump_stack+0x1b2/0x283 [ 330.169462] should_fail.cold+0x10a/0x154 [ 330.173623] should_failslab+0xd6/0x130 [ 330.177613] kmem_cache_alloc+0x40/0x3c0 [ 330.181688] sctp_get_port_local+0x2f2/0x1020 [ 330.186205] ? sctp_unhash+0x10/0x10 [ 330.189934] ? sctp_bind_addr_match+0x184/0x260 [ 330.194686] ? sctp_inet6_bind_verify+0x94/0x410 [ 330.199440] sctp_do_bind+0x1df/0x550 [ 330.203234] sctp_autobind+0x152/0x1c0 [ 330.207111] ? sctp_do_bind+0x550/0x550 [ 330.211128] ? sctp_endpoint_is_peeled_off+0xd4/0x10b [ 330.216317] __sctp_connect+0x66b/0xb60 [ 330.220291] ? sctp_bindx_rem+0x340/0x340 [ 330.224446] ? lock_acquire+0x170/0x3f0 [ 330.228430] ? lock_downgrade+0x6e0/0x6e0 [ 330.232575] ? __phys_addr_symbol+0x1f/0x60 [ 330.236963] ? __check_object_size+0x176/0x229 [ 330.241543] __sctp_setsockopt_connectx+0x1e9/0x280 [ 330.246556] sctp_setsockopt+0x2152/0x3be0 [ 330.250776] ? sock_has_perm+0x1c0/0x230 [ 330.254825] ? sctp_setsockopt_paddr_thresholds+0x390/0x390 [ 330.260522] ? lock_acquire+0x170/0x3f0 [ 330.264480] ? lock_downgrade+0x6e0/0x6e0 [ 330.268615] ? selinux_netlbl_socket_setsockopt+0x72/0x300 [ 330.274246] ? selinux_netlbl_sock_rcv_skb+0x3d0/0x3d0 [ 330.279525] ? __fget+0x226/0x360 [ 330.282974] ? selinux_socket_setsockopt+0x60/0x80 [ 330.287894] ? sock_common_setsockopt+0x1e/0xb0 [ 330.292548] SyS_setsockopt+0x110/0x1e0 [ 330.296509] ? SyS_recv+0x40/0x40 [ 330.299955] ? SyS_clock_settime+0x1a0/0x1a0 [ 330.304346] ? do_syscall_64+0x4c/0x640 [ 330.308303] ? SyS_recv+0x40/0x40 [ 330.311741] do_syscall_64+0x1d5/0x640 [ 330.315620] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 330.320797] RIP: 0033:0x45ca59 [ 330.323975] RSP: 002b:00007f5ca011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 330.331671] RAX: ffffffffffffffda RBX: 00000000005055e0 RCX: 000000000045ca59 [ 330.338922] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000005 [ 330.346197] RBP: 000000000078bf00 R08: 000000000000001c R09: 0000000000000000 [ 330.353452] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000006 [ 330.360706] R13: 0000000000000b0d R14: 00000000004d79d8 R15: 00007f5ca01206d4 [ 330.367976] CPU: 0 PID: 11361 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 330.375876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.385242] Call Trace: [ 330.387857] dump_stack+0x1b2/0x283 [ 330.391511] should_fail.cold+0x10a/0x154 [ 330.395673] should_failslab+0xd6/0x130 [ 330.399655] kmem_cache_alloc+0x28e/0x3c0 [ 330.403818] ? shmem_destroy_callback+0xa0/0xa0 [ 330.408509] shmem_alloc_inode+0x18/0x40 [ 330.412586] ? shmem_destroy_callback+0xa0/0xa0 [ 330.417270] alloc_inode+0x5d/0x170 [ 330.420906] new_inode_pseudo+0x14/0xe0 [ 330.424894] new_inode+0x1b/0x40 [ 330.428271] shmem_get_inode+0x74/0x780 [ 330.432261] __shmem_file_setup.part.0+0x104/0x3c0 [ 330.437197] ? shmem_rename2+0x6e0/0x6e0 [ 330.441259] ? __alloc_fd+0x1bf/0x490 [ 330.445065] SyS_memfd_create+0x1f6/0x3a0 [ 330.449219] ? shmem_fcntl+0x120/0x120 [ 330.453112] ? SyS_clock_settime+0x1a0/0x1a0 [ 330.457527] ? do_syscall_64+0x4c/0x640 [ 330.461509] ? shmem_fcntl+0x120/0x120 [ 330.465410] do_syscall_64+0x1d5/0x640 [ 330.469316] entry_SYSCALL_64_after_hwframe+0x46/0xbb 11:07:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmat(r2, &(0x7f0000ff7000/0x9000)=nil, 0x2000) shmctl$IPC_RMID(r2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 330.474518] RIP: 0033:0x45ca59 [ 330.477720] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 330.485440] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045ca59 [ 330.492726] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 330.500004] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 330.507285] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 330.514562] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:25 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 330.604127] FAULT_INJECTION: forcing a failure. [ 330.604127] name failslab, interval 1, probability 0, space 0, times 0 [ 330.629377] CPU: 1 PID: 11371 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 330.637321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.646690] Call Trace: [ 330.649300] dump_stack+0x1b2/0x283 [ 330.652943] should_fail.cold+0x10a/0x154 [ 330.657110] should_failslab+0xd6/0x130 [ 330.661092] kmem_cache_alloc+0x28e/0x3c0 [ 330.665252] selinux_inode_alloc_security+0xb1/0x2a0 [ 330.670427] security_inode_alloc+0x8f/0xd0 [ 330.674756] inode_init_always+0x576/0xb10 [ 330.678999] alloc_inode+0x7a/0x170 [ 330.682624] new_inode_pseudo+0x14/0xe0 [ 330.686591] new_inode+0x1b/0x40 [ 330.689946] shmem_get_inode+0x74/0x780 [ 330.693915] __shmem_file_setup.part.0+0x104/0x3c0 [ 330.698836] ? shmem_rename2+0x6e0/0x6e0 [ 330.702886] ? __alloc_fd+0x1bf/0x490 [ 330.706683] SyS_memfd_create+0x1f6/0x3a0 [ 330.710822] ? shmem_fcntl+0x120/0x120 [ 330.714697] ? SyS_clock_settime+0x1a0/0x1a0 [ 330.719092] ? do_syscall_64+0x4c/0x640 [ 330.723052] ? shmem_fcntl+0x120/0x120 [ 330.727039] do_syscall_64+0x1d5/0x640 [ 330.730931] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 330.736111] RIP: 0033:0x45ca59 [ 330.739292] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 330.746999] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045ca59 11:07:26 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 330.754259] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 330.761602] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 330.768855] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 330.776109] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 330.793208] NOHZ: local_softirq_pending 08 [ 330.816628] FAULT_INJECTION: forcing a failure. [ 330.816628] name failslab, interval 1, probability 0, space 0, times 0 [ 330.828186] CPU: 1 PID: 11376 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 330.836083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.845444] Call Trace: [ 330.848053] dump_stack+0x1b2/0x283 [ 330.851690] should_fail.cold+0x10a/0x154 [ 330.855830] should_failslab+0xd6/0x130 [ 330.859795] kmem_cache_alloc+0x28e/0x3c0 [ 330.864000] get_empty_filp+0x86/0x3e0 [ 330.867888] alloc_file+0x23/0x440 [ 330.871421] __shmem_file_setup.part.0+0x198/0x3c0 [ 330.876346] ? shmem_rename2+0x6e0/0x6e0 [ 330.880450] ? __alloc_fd+0x1bf/0x490 [ 330.884241] SyS_memfd_create+0x1f6/0x3a0 [ 330.888464] ? shmem_fcntl+0x120/0x120 [ 330.892334] ? SyS_clock_settime+0x1a0/0x1a0 [ 330.896733] ? do_syscall_64+0x4c/0x640 [ 330.900700] ? shmem_fcntl+0x120/0x120 [ 330.904574] do_syscall_64+0x1d5/0x640 [ 330.908451] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 330.913624] RIP: 0033:0x45ca59 [ 330.916794] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 330.924485] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045ca59 [ 330.931740] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 330.939061] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 330.946318] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 330.953580] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:28 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292", 0xcf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e20, @remote}], 0x10) [ 332.616917] FAULT_INJECTION: forcing a failure. [ 332.616917] name failslab, interval 1, probability 0, space 0, times 0 [ 332.658752] CPU: 1 PID: 11391 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 332.666680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.676040] Call Trace: [ 332.678641] dump_stack+0x1b2/0x283 [ 332.682289] should_fail.cold+0x10a/0x154 [ 332.686451] should_failslab+0xd6/0x130 [ 332.690451] kmem_cache_alloc+0x28e/0x3c0 [ 332.694603] selinux_file_alloc_security+0xaf/0x190 [ 332.699629] security_file_alloc+0x66/0xa0 [ 332.703863] ? selinux_is_enabled+0x5/0x50 [ 332.708099] get_empty_filp+0x15c/0x3e0 [ 332.712092] alloc_file+0x23/0x440 [ 332.715639] __shmem_file_setup.part.0+0x198/0x3c0 [ 332.720576] ? shmem_rename2+0x6e0/0x6e0 [ 332.724639] ? __alloc_fd+0x1bf/0x490 [ 332.728462] SyS_memfd_create+0x1f6/0x3a0 [ 332.732625] ? shmem_fcntl+0x120/0x120 [ 332.736526] ? SyS_clock_settime+0x1a0/0x1a0 [ 332.740952] ? do_syscall_64+0x4c/0x640 [ 332.744942] ? shmem_fcntl+0x120/0x120 [ 332.748847] do_syscall_64+0x1d5/0x640 [ 332.752756] entry_SYSCALL_64_after_hwframe+0x46/0xbb 11:07:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 332.757948] RIP: 0033:0x45ca59 [ 332.761138] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 332.768854] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045ca59 [ 332.776133] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c1bb1 [ 332.783409] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 332.790690] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 332.797970] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3", 0xbc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x463d}, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400040, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) socket$alg(0x26, 0x5, 0x0) sendto$l2tp(r0, &(0x7f0000000000)="04c3433a352a545bb5ec52f8aff3af809a581fc5be8264371d4907e25ba7fdfe0df12f3168fe57c652283958347b09c186dae731c476e1fc699a69", 0x3b, 0x40, 0x0, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) bind$vsock_dgram(r3, &(0x7f0000000040)={0x28, 0x0, 0xffffec77, @my=0x0}, 0x10) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec2", 0xce}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:28 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 332.933061] FAULT_INJECTION: forcing a failure. [ 332.933061] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 332.952560] CPU: 1 PID: 11424 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 332.960486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.969850] Call Trace: [ 332.972455] dump_stack+0x1b2/0x283 [ 332.976099] should_fail.cold+0x10a/0x154 [ 332.980338] __alloc_pages_nodemask+0x22b/0x2730 [ 332.985120] ? static_obj+0x50/0x50 [ 332.988762] ? trace_hardirqs_on+0x10/0x10 [ 332.993013] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 332.997869] ? avc_has_perm_noaudit+0x157/0x2a0 [ 333.002555] ? lock_acquire+0x170/0x3f0 [ 333.006546] ? lock_downgrade+0x6e0/0x6e0 [ 333.010787] alloc_pages_vma+0xc1/0x4b0 [ 333.014801] shmem_alloc_page+0xe1/0x180 [ 333.018875] ? shmem_swapin+0x180/0x180 [ 333.022870] ? cred_has_capability+0x11e/0x220 [ 333.027487] ? selinux_inode_copy_up+0x180/0x180 [ 333.032336] ? find_get_entry+0x31b/0x660 [ 333.036600] ? check_preemption_disabled+0x35/0x240 [ 333.041644] ? __vm_enough_memory+0x261/0x460 [ 333.046159] shmem_alloc_and_acct_page+0x126/0x670 [ 333.051114] shmem_getpage_gfp+0x388/0x27b0 [ 333.055467] ? shmem_should_replace_page.isra.0.part.0+0x10/0x10 [ 333.061728] shmem_write_begin+0xeb/0x190 [ 333.065898] generic_perform_write+0x1c9/0x420 [ 333.070511] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 333.075193] ? current_time+0xb0/0xb0 [ 333.079017] ? lock_acquire+0x170/0x3f0 [ 333.083016] __generic_file_write_iter+0x227/0x590 [ 333.087970] generic_file_write_iter+0x36f/0x650 [ 333.092758] __vfs_write+0x44e/0x630 [ 333.096496] ? kernel_read+0x110/0x110 [ 333.100527] ? rcu_read_lock_sched_held+0x10a/0x130 [ 333.105576] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 333.110348] vfs_write+0x17f/0x4d0 [ 333.113908] SyS_pwrite64+0x116/0x140 [ 333.117727] ? SyS_pread64+0x140/0x140 [ 333.121637] ? fput+0xb/0x140 [ 333.124765] ? do_syscall_64+0x4c/0x640 [ 333.128757] ? SyS_pread64+0x140/0x140 [ 333.132670] do_syscall_64+0x1d5/0x640 [ 333.136584] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 333.141791] RIP: 0033:0x4168b7 [ 333.144981] RSP: 002b:00007ff8e7b12a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 333.152700] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 00000000004168b7 [ 333.159974] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000004 [ 333.167245] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 333.174521] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000003 11:07:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 333.181798] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:28 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 333.297895] FAULT_INJECTION: forcing a failure. [ 333.297895] name failslab, interval 1, probability 0, space 0, times 0 [ 333.309420] CPU: 1 PID: 11444 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 333.317311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.326672] Call Trace: [ 333.329276] dump_stack+0x1b2/0x283 [ 333.332926] should_fail.cold+0x10a/0x154 [ 333.337095] should_failslab+0xd6/0x130 [ 333.341083] kmem_cache_alloc+0x40/0x3c0 [ 333.345255] radix_tree_node_alloc.constprop.0+0x1b4/0x300 [ 333.350899] __radix_tree_create+0x32b/0x4b0 [ 333.355329] __radix_tree_insert+0x98/0x500 [ 333.359671] ? __radix_tree_create+0x4b0/0x4b0 [ 333.364262] ? shmem_add_to_page_cache+0x236/0x7f0 [ 333.369216] shmem_add_to_page_cache+0x552/0x7f0 [ 333.373990] ? shmem_alloc_and_acct_page+0x670/0x670 [ 333.379111] ? __radix_tree_preload+0x1c3/0x250 [ 333.383802] shmem_getpage_gfp+0x13fa/0x27b0 [ 333.388252] ? shmem_should_replace_page.isra.0.part.0+0x10/0x10 [ 333.394422] shmem_write_begin+0xeb/0x190 [ 333.398590] generic_perform_write+0x1c9/0x420 [ 333.403199] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 333.407886] ? current_time+0xb0/0xb0 [ 333.411698] ? lock_acquire+0x170/0x3f0 [ 333.415713] __generic_file_write_iter+0x227/0x590 [ 333.420676] generic_file_write_iter+0x36f/0x650 [ 333.425449] __vfs_write+0x44e/0x630 [ 333.429189] ? kernel_read+0x110/0x110 [ 333.433107] ? rcu_read_lock_sched_held+0x10a/0x130 [ 333.438143] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 333.442951] vfs_write+0x17f/0x4d0 [ 333.446526] SyS_pwrite64+0x116/0x140 [ 333.450341] ? SyS_pread64+0x140/0x140 [ 333.454237] ? fput+0xb/0x140 [ 333.457351] ? do_syscall_64+0x4c/0x640 [ 333.461327] ? SyS_pread64+0x140/0x140 [ 333.465235] do_syscall_64+0x1d5/0x640 [ 333.469143] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 333.474340] RIP: 0033:0x4168b7 [ 333.477528] RSP: 002b:00007ff8e7b12a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 333.485240] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 00000000004168b7 [ 333.492517] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000004 [ 333.499789] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 333.507060] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000003 [ 333.514334] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 333.563994] BTRFS error (device loop5): superblock checksum mismatch 11:07:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x1}, 0x2300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 333.606441] BTRFS error (device loop5): open_ctree failed 11:07:31 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:31 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292", 0xcf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r1, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x6c, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={r2, 0x101, 0xc0b5, 0x7, 0x2, 0xd5}, &(0x7f0000000080)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r3 = socket$isdn(0x22, 0x3, 0x22) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0xad}, 0x0) setpriority(0x0, r4, 0x0) fcntl$setown(r3, 0x8, r4) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 335.662170] FAULT_INJECTION: forcing a failure. [ 335.662170] name failslab, interval 1, probability 0, space 0, times 0 [ 335.688540] CPU: 1 PID: 11476 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 335.696468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.705832] Call Trace: [ 335.708434] dump_stack+0x1b2/0x283 [ 335.712075] should_fail.cold+0x10a/0x154 [ 335.716269] should_failslab+0xd6/0x130 [ 335.720262] kmem_cache_alloc+0x28e/0x3c0 [ 335.724419] getname_flags+0xc8/0x550 [ 335.728228] do_sys_open+0x202/0x3e0 [ 335.731946] ? filp_open+0x60/0x60 [ 335.735486] ? SyS_pwrite64+0xca/0x140 [ 335.739386] ? fput+0xb/0x140 [ 335.742500] ? do_syscall_64+0x4c/0x640 [ 335.746483] ? do_sys_open+0x3e0/0x3e0 [ 335.750404] do_syscall_64+0x1d5/0x640 [ 335.754307] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 335.759507] RIP: 0033:0x416851 [ 335.762696] RSP: 002b:00007ff8e7b12a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 335.770418] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 0000000000416851 [ 335.777703] RDX: 00007ff8e7b12b0a RSI: 0000000000000002 RDI: 00007ff8e7b12b00 [ 335.784981] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 335.792264] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 335.799543] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f320", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:31 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d2", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:31 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:31 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0xad}, 0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3d83c1a8}, 0x0, 0x0, 0x0, 0x0, 0x80000}, r0, 0x0, 0xffffffffffffffff, 0x2) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="435e9eb7bd6f05c1fc191996ddaadaca365217fcb868d0c290571255ad186b0ddc153d9ec2f14d042f0e77ce13a977fee94817f8022ff126518db2c701e6fbcc74e05e782ba8348bd446ec7a28f7821cdd66fccc01cd0276c91366b767b2d20a14d8da43540e99e84d087a973c5a3805512f345041d64e7eeccd18dca88c45dfcaad1a702c13e7018bca59e7803ce99425f5d09ec41a67578054cce9496ba1487a5e35aa07f56f251d0868a407329a3ef9e4b1042006d867fb72c6880d232fb83c5a9871de9979", 0xc7}, {&(0x7f00000001c0)="282afa7f6052dc1fe22542a36ed0128b483cd2d6522586f7a5028fdce3a7dfcb063048d948d30151572275136e4ec56c278931bd4c990ddad553e62be6fc7d59286e7a3007ae1be43bd3f7cc4b9e1c97f4db0a01f5e39fae22047d8afa2f8818678ffb0b197fcfaf61abc5acab8994f26ffd1d642f31aad7bbf2688786dc6c93d91165e1e02c4546cc32d70ed86ade87d8ebd64171bbfc3e8f55dbeee53eabb205152d3e42d819a9a7df160e6a46742b4ee9f45f9f2a54ec2fcd28b78b98b2bd11c4c588d61a58019b793d0798409f0ece3d02d471cf644e2fb7f8862b07902fe1b51e3d84ad38debb053a2c2e2f2272e42f8af5", 0xf4}, {&(0x7f00000002c0)="e83362d51a8229355689d31f537a0925ab3b0b59afbd4ca12e9764da8e0672cfcdd8967d36962a506dd3405d5f5df7a9381868dad9c6cfbc21ef58ae18ffe5ef54aaea86a1e977b2b6aa498fdb0c6d3969bb70d8a0a80b9330ed9190f146a3ca88d299ba7a4af7c2b9505c8eb94f19925dc5f1615a02c3af69f051dfdfe8ac9fd6791914930794eaf9a63242c27c614ee1392e5e13097f4e7d34f34de7a9238be4fe8aa1ddd0d484f71eb696b00ba80d133b48beacb17595bd07b32d994b1f", 0xbf}, {&(0x7f0000000100)="6ad163129a54ecfa61926c5d88726ce532fc19dddd26658513abc1544afbb679c62272936d878b88f63485f14f35601b3185fbfcf51bf6e74868f148988513221014d4147b389d0a", 0x48}, {&(0x7f0000000380)="fa4d40f338743923996ef74e32315f643244b63f1b671f41b04816fa1518a1c3232b68a06b9db0e58e177e1d571cabffa7d755dfe2205d49ffe3d824c5f78a4956f9caa058cbf05f09e4e9793eb76cbe9449c7d2db9909516341ffbb5ae711f04322c3adad143d284a5d820bf62333e0dfd510375f55ce4402e18eb59a392b27b2eafef7f8ef2d82e1cd011282d8ef8f5c8a3b23351f59441086d877ecae245595c408c7b7f556ed7cec6c78d329b78b93aa573017b8d3b8dc398efd4d02be47191b", 0xc2}], 0x5, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x180, 0x400c0}, {0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000980)="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", 0x159}, {&(0x7f0000000780)="b8413684a877aa923bd93d3cce99a2efa57f1982e12d800a6fcdb2b19381c7ee9905bc99af3f8ad8a5335db9afdc08e7128e196d5b41715312e2289d1149a8a911412910eed6a8741a6a543e1413deccf08e9e8ee8489ac8782a214230e630040a60", 0x62}], 0x2, &(0x7f0000000840)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x20, 0x117, 0x2, 0x9, "ca7b9c010dcb0f89a0"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x9}, @op={0x18}], 0x98, 0x40000}], 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r1, &(0x7f0000000b80)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x18, 0x1411, 0x100, 0x70bd27, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x8091}, 0x4000001) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r3 = semget$private(0x0, 0x2, 0x0) semtimedop(r3, &(0x7f0000000180)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000000000)) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000680)=""/135) [ 335.962990] FAULT_INJECTION: forcing a failure. [ 335.962990] name failslab, interval 1, probability 0, space 0, times 0 [ 336.003077] CPU: 0 PID: 11496 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 336.011007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.020373] Call Trace: [ 336.022978] dump_stack+0x1b2/0x283 [ 336.026626] should_fail.cold+0x10a/0x154 [ 336.030801] should_failslab+0xd6/0x130 [ 336.034800] kmem_cache_alloc+0x28e/0x3c0 [ 336.038975] get_empty_filp+0x86/0x3e0 [ 336.042986] path_openat+0x87/0x2aa0 [ 336.046722] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 336.051361] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 336.055886] ? kmem_cache_alloc+0x124/0x3c0 [ 336.060497] ? getname_flags+0xc8/0x550 [ 336.064496] ? do_sys_open+0x202/0x3e0 [ 336.068410] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 336.073799] ? path_mountpoint+0x960/0x960 [ 336.078061] ? trace_hardirqs_on+0x10/0x10 [ 336.082329] ? __generic_file_write_iter+0x194/0x590 [ 336.087458] do_filp_open+0x18e/0x250 [ 336.091281] ? may_open_dev+0xe0/0xe0 [ 336.095099] ? __alloc_fd+0x1bf/0x490 [ 336.098914] ? lock_acquire+0x170/0x3f0 [ 336.102903] ? lock_downgrade+0x6e0/0x6e0 [ 336.107157] ? do_raw_spin_unlock+0x164/0x250 [ 336.111679] ? __alloc_fd+0x1bf/0x490 [ 336.115500] do_sys_open+0x292/0x3e0 [ 336.119232] ? filp_open+0x60/0x60 [ 336.122784] ? SyS_pwrite64+0xca/0x140 [ 336.126683] ? fput+0xb/0x140 [ 336.129804] ? do_syscall_64+0x4c/0x640 [ 336.133791] ? do_sys_open+0x3e0/0x3e0 [ 336.137703] do_syscall_64+0x1d5/0x640 [ 336.141616] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 336.146812] RIP: 0033:0x416851 [ 336.150016] RSP: 002b:00007ff8e7b12a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 11:07:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x0, 0x0, 0x800002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 336.157741] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 0000000000416851 [ 336.165026] RDX: 00007ff8e7b12b0a RSI: 0000000000000002 RDI: 00007ff8e7b12b00 [ 336.172307] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 336.179593] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 336.186957] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:31 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 336.294780] FAULT_INJECTION: forcing a failure. [ 336.294780] name failslab, interval 1, probability 0, space 0, times 0 [ 336.315695] CPU: 1 PID: 11527 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 336.323623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.332983] Call Trace: [ 336.335583] dump_stack+0x1b2/0x283 [ 336.339237] should_fail.cold+0x10a/0x154 11:07:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_open_dev$vim2m(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x30, 0x4, 0x8, 0x301, 0x0, 0x0, {0x1, 0x0, 0xa}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x10}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x1) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) [ 336.343398] should_failslab+0xd6/0x130 [ 336.347381] kmem_cache_alloc+0x28e/0x3c0 [ 336.351535] get_empty_filp+0x86/0x3e0 [ 336.355433] path_openat+0x87/0x2aa0 [ 336.359166] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 336.363677] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 336.368188] ? kmem_cache_alloc+0x124/0x3c0 [ 336.372531] ? getname_flags+0xc8/0x550 [ 336.376530] ? do_sys_open+0x202/0x3e0 [ 336.380436] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 336.385823] ? path_mountpoint+0x960/0x960 [ 336.390073] ? trace_hardirqs_on+0x10/0x10 [ 336.394330] do_filp_open+0x18e/0x250 [ 336.398142] ? may_open_dev+0xe0/0xe0 [ 336.401958] ? __alloc_fd+0x1bf/0x490 [ 336.405772] ? lock_acquire+0x170/0x3f0 [ 336.409779] ? lock_downgrade+0x6e0/0x6e0 [ 336.413947] ? do_raw_spin_unlock+0x164/0x250 [ 336.418479] ? __alloc_fd+0x1bf/0x490 [ 336.422294] do_sys_open+0x292/0x3e0 [ 336.426008] ? filp_open+0x60/0x60 [ 336.429554] ? SyS_pwrite64+0xca/0x140 [ 336.433451] ? fput+0xb/0x140 [ 336.436567] ? do_syscall_64+0x4c/0x640 [ 336.440551] ? do_sys_open+0x3e0/0x3e0 [ 336.444472] do_syscall_64+0x1d5/0x640 [ 336.448372] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 336.453571] RIP: 0033:0x416851 [ 336.456762] RSP: 002b:00007ff8e7b12a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 336.464482] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 0000000000416851 [ 336.471843] RDX: 00007ff8e7b12b0a RSI: 0000000000000002 RDI: 00007ff8e7b12b00 [ 336.479121] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 336.486397] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 336.493671] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:31 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 336.534605] audit: type=1326 audit(1592910451.945:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11532 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f89a code=0x0 [ 336.575972] FAULT_INJECTION: forcing a failure. [ 336.575972] name failslab, interval 1, probability 0, space 0, times 0 [ 336.592730] CPU: 0 PID: 11541 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 336.600748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.610104] Call Trace: [ 336.612686] dump_stack+0x1b2/0x283 [ 336.616304] should_fail.cold+0x10a/0x154 [ 336.620440] should_failslab+0xd6/0x130 [ 336.624400] kmem_cache_alloc+0x28e/0x3c0 [ 336.628551] selinux_file_alloc_security+0xaf/0x190 [ 336.633565] security_file_alloc+0x66/0xa0 [ 336.637787] ? selinux_is_enabled+0x5/0x50 [ 336.642022] get_empty_filp+0x15c/0x3e0 [ 336.645996] path_openat+0x87/0x2aa0 [ 336.649711] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 336.654190] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 336.658671] ? kmem_cache_alloc+0x124/0x3c0 [ 336.662989] ? getname_flags+0xc8/0x550 [ 336.666954] ? do_sys_open+0x202/0x3e0 [ 336.670834] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 336.676190] ? path_mountpoint+0x960/0x960 [ 336.680414] ? trace_hardirqs_on+0x10/0x10 [ 336.684650] do_filp_open+0x18e/0x250 [ 336.688440] ? may_open_dev+0xe0/0xe0 [ 336.692222] ? __alloc_fd+0x1bf/0x490 [ 336.696030] ? lock_acquire+0x170/0x3f0 [ 336.699994] ? lock_downgrade+0x6e0/0x6e0 [ 336.704130] ? do_raw_spin_unlock+0x164/0x250 [ 336.708609] ? __alloc_fd+0x1bf/0x490 [ 336.712398] do_sys_open+0x292/0x3e0 [ 336.716098] ? filp_open+0x60/0x60 [ 336.719628] ? SyS_pwrite64+0xca/0x140 [ 336.723511] ? fput+0xb/0x140 [ 336.726607] ? do_syscall_64+0x4c/0x640 [ 336.730570] ? do_sys_open+0x3e0/0x3e0 [ 336.734453] do_syscall_64+0x1d5/0x640 [ 336.738334] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 336.743512] RIP: 0033:0x416851 [ 336.746682] RSP: 002b:00007ff8e7b12a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 336.754371] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 0000000000416851 [ 336.761632] RDX: 00007ff8e7b12b0a RSI: 0000000000000002 RDI: 00007ff8e7b12b00 [ 336.768891] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 11:07:32 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 336.776145] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 336.783467] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 336.830459] FAULT_INJECTION: forcing a failure. [ 336.830459] name failslab, interval 1, probability 0, space 0, times 0 [ 336.842443] CPU: 1 PID: 11544 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 336.850332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.859703] Call Trace: [ 336.862293] dump_stack+0x1b2/0x283 [ 336.865911] should_fail.cold+0x10a/0x154 [ 336.870053] should_failslab+0xd6/0x130 [ 336.874031] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 336.878784] ? loop_get_status64+0x100/0x100 [ 336.883196] __kthread_create_on_node+0xbe/0x3a0 [ 336.887947] ? kthread_park+0x130/0x130 [ 336.891918] ? lo_ioctl+0x87/0x1c00 [ 336.895541] ? __mutex_lock+0x2cb/0x1430 [ 336.899605] ? __fget+0x1ff/0x360 [ 336.903068] ? loop_get_status64+0x100/0x100 [ 336.907486] kthread_create_on_node+0xa8/0xd0 [ 336.911992] ? __kthread_create_on_node+0x3a0/0x3a0 [ 336.917018] ? __lockdep_init_map+0x100/0x560 [ 336.921512] ? __lockdep_init_map+0x100/0x560 [ 336.926008] lo_ioctl+0xca9/0x1c00 [ 336.929547] ? loop_clr_fd+0xac0/0xac0 [ 336.933489] blkdev_ioctl+0x91d/0x17c0 [ 336.937384] ? blkpg_ioctl+0x8d0/0x8d0 [ 336.941274] ? trace_hardirqs_on+0x10/0x10 [ 336.945574] block_ioctl+0xd9/0x120 [ 336.949193] ? blkdev_fallocate+0x3a0/0x3a0 [ 336.953506] do_vfs_ioctl+0x75a/0xfe0 [ 336.957311] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 336.962936] ? ioctl_preallocate+0x1a0/0x1a0 [ 336.967340] ? security_file_ioctl+0x76/0xb0 [ 336.971732] ? security_file_ioctl+0x83/0xb0 [ 336.976133] SyS_ioctl+0x7f/0xb0 [ 336.979500] ? do_vfs_ioctl+0xfe0/0xfe0 [ 336.983484] do_syscall_64+0x1d5/0x640 [ 336.987372] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 336.992550] RIP: 0033:0x45c927 [ 336.995729] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.003437] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 337.010697] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 337.017960] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 11:07:32 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 337.025230] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 337.032491] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 337.081026] FAULT_INJECTION: forcing a failure. [ 337.081026] name failslab, interval 1, probability 0, space 0, times 0 [ 337.089895] print_req_error: I/O error, dev loop5, sector 0 [ 337.093492] CPU: 1 PID: 11549 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 337.105888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.109445] print_req_error: I/O error, dev loop5, sector 0 [ 337.115260] Call Trace: [ 337.115293] dump_stack+0x1b2/0x283 [ 337.115311] should_fail.cold+0x10a/0x154 [ 337.115328] should_failslab+0xd6/0x130 [ 337.121454] Buffer I/O error on dev loop5, logical block 0, async page read [ 337.123786] kmem_cache_alloc+0x28e/0x3c0 [ 337.123871] __kernfs_new_node+0x6f/0x470 [ 337.123883] kernfs_new_node+0x7b/0xe0 [ 337.131173] print_req_error: I/O error, dev loop5, sector 0 [ 337.131661] kernfs_create_dir_ns+0x3c/0x130 [ 337.135664] Buffer I/O error on dev loop5, logical block 0, async page read [ 337.142732] internal_create_group+0xea/0x7e0 [ 337.142750] lo_ioctl+0x1108/0x1c00 [ 337.142763] ? loop_clr_fd+0xac0/0xac0 [ 337.142774] blkdev_ioctl+0x91d/0x17c0 [ 337.142782] ? blkpg_ioctl+0x8d0/0x8d0 [ 337.142791] ? trace_hardirqs_on+0x10/0x10 [ 337.142810] block_ioctl+0xd9/0x120 [ 337.142821] ? blkdev_fallocate+0x3a0/0x3a0 [ 337.150567] print_req_error: I/O error, dev loop5, sector 0 [ 337.151105] do_vfs_ioctl+0x75a/0xfe0 [ 337.155009] Buffer I/O error on dev loop5, logical block 0, async page read [ 337.160700] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 337.160712] ? ioctl_preallocate+0x1a0/0x1a0 [ 337.160729] ? security_file_ioctl+0x76/0xb0 [ 337.160737] ? security_file_ioctl+0x83/0xb0 [ 337.160746] SyS_ioctl+0x7f/0xb0 [ 337.160752] ? do_vfs_ioctl+0xfe0/0xfe0 [ 337.160764] do_syscall_64+0x1d5/0x640 [ 337.160781] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 337.165451] print_req_error: I/O error, dev loop5, sector 0 [ 337.172288] RIP: 0033:0x45c927 [ 337.172303] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.172312] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 337.172316] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 337.172320] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 337.172325] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 337.172330] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 337.216519] audit: type=1326 audit(1592910452.635:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11532 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f89a code=0x0 [ 337.221595] Buffer I/O error on dev loop5, logical block 0, async page read [ 337.342313] BTRFS error (device loop5): superblock checksum mismatch [ 337.376215] BTRFS error (device loop5): open_ctree failed 11:07:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f320", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1a, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000)=0x3, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:34 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:34 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d2", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 339.030269] FAULT_INJECTION: forcing a failure. [ 339.030269] name failslab, interval 1, probability 0, space 0, times 0 [ 339.042142] CPU: 1 PID: 11581 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 339.050044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.059412] Call Trace: [ 339.062020] dump_stack+0x1b2/0x283 [ 339.065673] should_fail.cold+0x10a/0x154 [ 339.069845] should_failslab+0xd6/0x130 [ 339.073840] kmem_cache_alloc+0x40/0x3c0 [ 339.077921] radix_tree_node_alloc.constprop.0+0x1b4/0x300 [ 339.083562] ? kernfs_new_node+0x7b/0xe0 [ 339.087644] idr_get_free_cmn+0x591/0x8d0 [ 339.091824] idr_alloc_cmn+0xe8/0x1e0 [ 339.095640] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 339.100504] ? _raw_spin_unlock_irq+0x24/0x90 [ 339.105017] ? fs_reclaim_acquire+0x10/0x10 [ 339.109359] idr_alloc_cyclic+0xc2/0x1d0 [ 339.113441] ? idr_alloc_cmn+0x1e0/0x1e0 [ 339.117668] ? __radix_tree_preload+0x1c3/0x250 [ 339.122360] __kernfs_new_node+0xaf/0x470 [ 339.126531] kernfs_new_node+0x7b/0xe0 11:07:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PPPIOCDISCONN(r0, 0x7439) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000000)={0x5, [0x10000, 0xfffffffd], 0xb455}, 0x10) socket(0x0, 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 339.130437] kernfs_create_dir_ns+0x3c/0x130 [ 339.134867] internal_create_group+0xea/0x7e0 [ 339.139385] lo_ioctl+0x1108/0x1c00 [ 339.143053] ? loop_clr_fd+0xac0/0xac0 [ 339.146958] blkdev_ioctl+0x91d/0x17c0 [ 339.150981] ? blkpg_ioctl+0x8d0/0x8d0 [ 339.154890] ? trace_hardirqs_on+0x10/0x10 [ 339.159158] block_ioctl+0xd9/0x120 [ 339.162802] ? blkdev_fallocate+0x3a0/0x3a0 [ 339.167141] do_vfs_ioctl+0x75a/0xfe0 [ 339.170959] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 339.176602] ? ioctl_preallocate+0x1a0/0x1a0 [ 339.181050] ? security_file_ioctl+0x76/0xb0 [ 339.185474] ? security_file_ioctl+0x83/0xb0 [ 339.189900] SyS_ioctl+0x7f/0xb0 [ 339.193281] ? do_vfs_ioctl+0xfe0/0xfe0 [ 339.197269] do_syscall_64+0x1d5/0x640 [ 339.201177] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 339.206369] RIP: 0033:0x45c927 [ 339.209562] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.217280] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 339.224555] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 339.231831] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 339.239109] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 339.246384] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 339.288780] BTRFS error (device loop5): superblock checksum mismatch 11:07:34 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 339.339775] BTRFS error (device loop5): open_ctree failed [ 339.420978] FAULT_INJECTION: forcing a failure. [ 339.420978] name failslab, interval 1, probability 0, space 0, times 0 [ 339.435723] CPU: 0 PID: 11608 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 339.441446] print_req_error: I/O error, dev loop5, sector 0 [ 339.443662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.449895] print_req_error: I/O error, dev loop5, sector 0 [ 339.458711] Call Trace: [ 339.458733] dump_stack+0x1b2/0x283 [ 339.458749] should_fail.cold+0x10a/0x154 [ 339.458764] should_failslab+0xd6/0x130 [ 339.458773] kmem_cache_alloc+0x28e/0x3c0 [ 339.458787] __kernfs_new_node+0x6f/0x470 [ 339.464488] Buffer I/O error on dev loop5, logical block 0, async page read [ 339.467062] kernfs_new_node+0x7b/0xe0 [ 339.467075] __kernfs_create_file+0x3d/0x320 [ 339.467085] sysfs_add_file_mode_ns+0x1e1/0x450 [ 339.467099] internal_create_group+0x23b/0x7e0 [ 339.476978] print_req_error: I/O error, dev loop5, sector 0 [ 339.478813] lo_ioctl+0x1108/0x1c00 [ 339.482938] Buffer I/O error on dev loop5, logical block 0, async page read [ 339.487075] ? loop_clr_fd+0xac0/0xac0 [ 339.487087] blkdev_ioctl+0x91d/0x17c0 [ 339.487095] ? blkpg_ioctl+0x8d0/0x8d0 [ 339.487105] ? trace_hardirqs_on+0x10/0x10 [ 339.487125] block_ioctl+0xd9/0x120 [ 339.487135] ? blkdev_fallocate+0x3a0/0x3a0 [ 339.495987] print_req_error: I/O error, dev loop5, sector 0 [ 339.498097] do_vfs_ioctl+0x75a/0xfe0 [ 339.502487] Buffer I/O error on dev loop5, logical block 0, async page read [ 339.507143] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 339.507154] ? ioctl_preallocate+0x1a0/0x1a0 [ 339.507171] ? security_file_ioctl+0x76/0xb0 [ 339.507179] ? security_file_ioctl+0x83/0xb0 [ 339.507188] SyS_ioctl+0x7f/0xb0 [ 339.512023] print_req_error: I/O error, dev loop5, sector 0 [ 339.517463] ? do_vfs_ioctl+0xfe0/0xfe0 [ 339.517476] do_syscall_64+0x1d5/0x640 [ 339.517491] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 339.517499] RIP: 0033:0x45c927 [ 339.517506] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 [ 339.521125] Buffer I/O error on dev loop5, logical block 0, async page read [ 339.528201] ORIG_RAX: 0000000000000010 [ 339.528208] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 339.528212] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 339.528216] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 339.528221] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 339.528226] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x5) [ 339.667562] Buffer I/O error on dev loop5, logical block 0, async page read [ 339.675081] Buffer I/O error on dev loop5, logical block 0, async page read [ 339.695673] BTRFS error (device loop5): superblock checksum mismatch [ 339.757629] BTRFS error (device loop5): open_ctree failed 11:07:35 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 339.938135] FAULT_INJECTION: forcing a failure. [ 339.938135] name failslab, interval 1, probability 0, space 0, times 0 [ 339.949785] CPU: 1 PID: 11628 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 339.957684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.967048] Call Trace: [ 339.969659] dump_stack+0x1b2/0x283 [ 339.973313] should_fail.cold+0x10a/0x154 [ 339.977489] should_failslab+0xd6/0x130 [ 339.981477] kmem_cache_alloc+0x28e/0x3c0 [ 339.985643] __kernfs_new_node+0x6f/0x470 [ 339.989825] kernfs_new_node+0x7b/0xe0 [ 339.993729] __kernfs_create_file+0x3d/0x320 [ 339.998141] sysfs_add_file_mode_ns+0x1e1/0x450 [ 340.002808] internal_create_group+0x23b/0x7e0 [ 340.007403] lo_ioctl+0x1108/0x1c00 [ 340.011131] ? loop_clr_fd+0xac0/0xac0 [ 340.015015] blkdev_ioctl+0x91d/0x17c0 [ 340.018890] ? blkpg_ioctl+0x8d0/0x8d0 [ 340.022768] ? trace_hardirqs_on+0x10/0x10 [ 340.027011] block_ioctl+0xd9/0x120 [ 340.030800] ? blkdev_fallocate+0x3a0/0x3a0 [ 340.035118] do_vfs_ioctl+0x75a/0xfe0 [ 340.038916] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 340.044535] ? ioctl_preallocate+0x1a0/0x1a0 [ 340.048939] ? security_file_ioctl+0x76/0xb0 [ 340.053337] ? security_file_ioctl+0x83/0xb0 [ 340.057744] SyS_ioctl+0x7f/0xb0 [ 340.061219] ? do_vfs_ioctl+0xfe0/0xfe0 [ 340.065183] do_syscall_64+0x1d5/0x640 [ 340.069064] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 340.074236] RIP: 0033:0x45c927 [ 340.077412] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 11:07:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100000001, 0x3}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xc, r0, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 340.085117] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 340.092376] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 340.099633] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 340.106894] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 340.114224] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 340.140908] BTRFS error (device loop5): superblock checksum mismatch 11:07:35 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 340.196059] BTRFS error (device loop5): open_ctree failed [ 340.268040] FAULT_INJECTION: forcing a failure. [ 340.268040] name failslab, interval 1, probability 0, space 0, times 0 [ 340.280326] CPU: 0 PID: 11648 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 340.288233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.297593] Call Trace: [ 340.300202] dump_stack+0x1b2/0x283 [ 340.303852] should_fail.cold+0x10a/0x154 [ 340.308026] should_failslab+0xd6/0x130 [ 340.312029] kmem_cache_alloc+0x28e/0x3c0 [ 340.316194] __kernfs_new_node+0x6f/0x470 [ 340.320351] kernfs_new_node+0x7b/0xe0 [ 340.324230] __kernfs_create_file+0x3d/0x320 [ 340.328627] sysfs_add_file_mode_ns+0x1e1/0x450 [ 340.333286] internal_create_group+0x23b/0x7e0 [ 340.337869] lo_ioctl+0x1108/0x1c00 [ 340.341486] ? loop_clr_fd+0xac0/0xac0 [ 340.345425] blkdev_ioctl+0x91d/0x17c0 [ 340.349299] ? blkpg_ioctl+0x8d0/0x8d0 [ 340.353170] ? trace_hardirqs_on+0x10/0x10 [ 340.357406] block_ioctl+0xd9/0x120 [ 340.361041] ? blkdev_fallocate+0x3a0/0x3a0 [ 340.365364] do_vfs_ioctl+0x75a/0xfe0 [ 340.369172] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 340.374804] ? ioctl_preallocate+0x1a0/0x1a0 [ 340.379237] ? security_file_ioctl+0x76/0xb0 [ 340.383653] ? security_file_ioctl+0x83/0xb0 [ 340.388078] SyS_ioctl+0x7f/0xb0 [ 340.391456] ? do_vfs_ioctl+0xfe0/0xfe0 [ 340.395448] do_syscall_64+0x1d5/0x640 [ 340.399353] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 340.404540] RIP: 0033:0x45c927 [ 340.407713] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 340.415505] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 340.422762] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 340.430123] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 340.437381] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 340.444693] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 340.481810] BTRFS error (device loop5): superblock checksum mismatch [ 340.526551] BTRFS error (device loop5): open_ctree failed 11:07:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f320", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f0000000080)={0x0, &(0x7f0000000040)=[&(0x7f0000000000)="8df7c7ea8be79aa4c2a92992d9ab6c4954df42de8ac8b7d2b42f58acf646eac0ec", &(0x7f00000001c0)="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", &(0x7f00000011c0)="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"]}) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r3 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6, 0x0, 0xa}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', r6}) 11:07:37 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:37 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d2", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 342.034080] FAULT_INJECTION: forcing a failure. [ 342.034080] name failslab, interval 1, probability 0, space 0, times 0 [ 342.051532] CPU: 0 PID: 11673 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 342.059573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.068940] Call Trace: [ 342.071546] dump_stack+0x1b2/0x283 [ 342.075196] should_fail.cold+0x10a/0x154 [ 342.079364] should_failslab+0xd6/0x130 [ 342.083356] kmem_cache_alloc+0x28e/0x3c0 [ 342.087521] __kernfs_new_node+0x6f/0x470 [ 342.091687] kernfs_new_node+0x7b/0xe0 [ 342.095588] __kernfs_create_file+0x3d/0x320 [ 342.100016] sysfs_add_file_mode_ns+0x1e1/0x450 [ 342.104707] internal_create_group+0x23b/0x7e0 [ 342.109318] lo_ioctl+0x1108/0x1c00 [ 342.112962] ? loop_clr_fd+0xac0/0xac0 [ 342.116865] blkdev_ioctl+0x91d/0x17c0 [ 342.120793] ? blkpg_ioctl+0x8d0/0x8d0 [ 342.124696] ? trace_hardirqs_on+0x10/0x10 [ 342.128960] block_ioctl+0xd9/0x120 [ 342.132601] ? blkdev_fallocate+0x3a0/0x3a0 [ 342.136923] do_vfs_ioctl+0x75a/0xfe0 [ 342.140734] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 342.146361] ? ioctl_preallocate+0x1a0/0x1a0 [ 342.150771] ? security_file_ioctl+0x76/0xb0 [ 342.155165] ? security_file_ioctl+0x83/0xb0 [ 342.159692] SyS_ioctl+0x7f/0xb0 [ 342.163053] ? do_vfs_ioctl+0xfe0/0xfe0 [ 342.167022] do_syscall_64+0x1d5/0x640 [ 342.170910] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 342.176097] RIP: 0033:0x45c927 [ 342.179277] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.186977] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 342.194242] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 342.201499] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 342.208754] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 342.216014] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 342.233545] BTRFS error (device loop5): superblock checksum mismatch 11:07:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:37 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 342.275882] BTRFS error (device loop5): open_ctree failed [ 342.352049] FAULT_INJECTION: forcing a failure. [ 342.352049] name failslab, interval 1, probability 0, space 0, times 0 [ 342.364168] CPU: 0 PID: 11699 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 342.372076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.381440] Call Trace: [ 342.384040] dump_stack+0x1b2/0x283 [ 342.387689] should_fail.cold+0x10a/0x154 [ 342.391857] should_failslab+0xd6/0x130 [ 342.395853] kmem_cache_alloc+0x28e/0x3c0 [ 342.400006] __kernfs_new_node+0x6f/0x470 [ 342.404222] kernfs_new_node+0x7b/0xe0 [ 342.407226] print_req_error: 10 callbacks suppressed [ 342.407232] print_req_error: I/O error, dev loop5, sector 0 [ 342.408105] __kernfs_create_file+0x3d/0x320 [ 342.413312] print_req_error: I/O error, dev loop5, sector 0 [ 342.418895] sysfs_add_file_mode_ns+0x1e1/0x450 [ 342.418909] internal_create_group+0x23b/0x7e0 [ 342.418925] lo_ioctl+0x1108/0x1c00 [ 342.418939] ? loop_clr_fd+0xac0/0xac0 [ 342.418951] blkdev_ioctl+0x91d/0x17c0 11:07:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 342.418958] ? blkpg_ioctl+0x8d0/0x8d0 [ 342.418968] ? trace_hardirqs_on+0x10/0x10 [ 342.418987] block_ioctl+0xd9/0x120 [ 342.418997] ? blkdev_fallocate+0x3a0/0x3a0 [ 342.423405] buffer_io_error: 7 callbacks suppressed [ 342.423410] Buffer I/O error on dev loop5, logical block 0, async page read [ 342.429085] do_vfs_ioctl+0x75a/0xfe0 [ 342.429098] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 342.429107] ? ioctl_preallocate+0x1a0/0x1a0 [ 342.429127] ? security_file_ioctl+0x76/0xb0 [ 342.448108] print_req_error: I/O error, dev loop5, sector 0 11:07:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 342.449719] ? security_file_ioctl+0x83/0xb0 [ 342.449733] SyS_ioctl+0x7f/0xb0 [ 342.453625] Buffer I/O error on dev loop5, logical block 0, async page read [ 342.457850] ? do_vfs_ioctl+0xfe0/0xfe0 [ 342.457864] do_syscall_64+0x1d5/0x640 [ 342.457881] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 342.457889] RIP: 0033:0x45c927 [ 342.457894] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.457903] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 11:07:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:07:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x11) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 342.457908] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 342.457913] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 342.457918] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 342.457924] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 342.592504] BTRFS error (device loop5): superblock checksum mismatch [ 342.636067] BTRFS error (device loop5): open_ctree failed 11:07:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:40 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:40 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 345.080393] FAULT_INJECTION: forcing a failure. [ 345.080393] name failslab, interval 1, probability 0, space 0, times 0 [ 345.123992] CPU: 1 PID: 11740 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 345.131920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.141277] Call Trace: [ 345.143882] dump_stack+0x1b2/0x283 [ 345.147542] should_fail.cold+0x10a/0x154 [ 345.151716] should_failslab+0xd6/0x130 [ 345.155710] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 345.160461] ? dev_uevent_filter+0xd0/0xd0 [ 345.164716] kobject_uevent_env+0x1fa/0xc50 [ 345.169062] lo_ioctl+0x1177/0x1c00 [ 345.172711] ? loop_clr_fd+0xac0/0xac0 [ 345.176732] blkdev_ioctl+0x91d/0x17c0 [ 345.180638] ? blkpg_ioctl+0x8d0/0x8d0 [ 345.184544] ? trace_hardirqs_on+0x10/0x10 [ 345.188812] block_ioctl+0xd9/0x120 [ 345.192450] ? blkdev_fallocate+0x3a0/0x3a0 [ 345.196783] do_vfs_ioctl+0x75a/0xfe0 [ 345.200602] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 345.206244] ? ioctl_preallocate+0x1a0/0x1a0 [ 345.210679] ? security_file_ioctl+0x76/0xb0 [ 345.215111] ? security_file_ioctl+0x83/0xb0 [ 345.219550] SyS_ioctl+0x7f/0xb0 11:07:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:40 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 345.222929] ? do_vfs_ioctl+0xfe0/0xfe0 [ 345.226920] do_syscall_64+0x1d5/0x640 [ 345.230830] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 345.236034] RIP: 0033:0x45c927 [ 345.239227] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 345.246966] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 345.254244] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 345.261523] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 345.268810] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 345.276197] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:40 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 345.331341] ptrace attach of "/root/syz-executor.2"[11768] was attempted by "/root/syz-executor.2"[11769] 11:07:40 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 345.390470] BTRFS error (device loop5): superblock checksum mismatch [ 345.409877] ptrace attach of "/root/syz-executor.2"[11776] was attempted by "/root/syz-executor.2"[11777] [ 345.430412] BTRFS error (device loop5): open_ctree failed 11:07:40 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 345.501856] ptrace attach of "/root/syz-executor.2"[11785] was attempted by "/root/syz-executor.2"[11787] [ 345.524636] FAULT_INJECTION: forcing a failure. [ 345.524636] name failslab, interval 1, probability 0, space 0, times 0 [ 345.539855] CPU: 1 PID: 11790 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 345.547779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.557140] Call Trace: [ 345.559760] dump_stack+0x1b2/0x283 [ 345.563425] should_fail.cold+0x10a/0x154 [ 345.567599] should_failslab+0xd6/0x130 [ 345.569469] print_req_error: I/O error, dev loop5, sector 0 [ 345.571589] __kmalloc+0x2c1/0x400 [ 345.580934] ? kobject_get_path+0xb0/0x190 [ 345.583692] print_req_error: I/O error, dev loop5, sector 0 [ 345.585186] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 345.585203] kobject_get_path+0xb0/0x190 [ 345.585217] kobject_uevent_env+0x21e/0xc50 [ 345.585238] lo_ioctl+0x1177/0x1c00 [ 345.591055] Buffer I/O error on dev loop5, logical block 0, async page read [ 345.596441] ? loop_clr_fd+0xac0/0xac0 [ 345.596454] blkdev_ioctl+0x91d/0x17c0 [ 345.596462] ? blkpg_ioctl+0x8d0/0x8d0 [ 345.596475] ? trace_hardirqs_on+0x10/0x10 [ 345.600961] print_req_error: I/O error, dev loop5, sector 0 [ 345.604866] block_ioctl+0xd9/0x120 [ 345.604879] ? blkdev_fallocate+0x3a0/0x3a0 [ 345.604889] do_vfs_ioctl+0x75a/0xfe0 [ 345.604902] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 345.604912] ? ioctl_preallocate+0x1a0/0x1a0 [ 345.608620] Buffer I/O error on dev loop5, logical block 0, async page read [ 345.616102] ? security_file_ioctl+0x76/0xb0 [ 345.616111] ? security_file_ioctl+0x83/0xb0 [ 345.616122] SyS_ioctl+0x7f/0xb0 [ 345.616132] ? do_vfs_ioctl+0xfe0/0xfe0 [ 345.620432] print_req_error: I/O error, dev loop5, sector 0 [ 345.623915] do_syscall_64+0x1d5/0x640 [ 345.623935] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 345.623944] RIP: 0033:0x45c927 [ 345.623966] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 345.623975] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 345.623984] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 345.627929] Buffer I/O error on dev loop5, logical block 0, async page read [ 345.632097] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 345.632102] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 345.632107] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 345.758828] BTRFS error (device loop5): superblock checksum mismatch [ 345.805984] BTRFS error (device loop5): open_ctree failed 11:07:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1a, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6c, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000040)=0x25) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000080)=r7, 0x4) 11:07:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:43 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 348.137611] FAULT_INJECTION: forcing a failure. [ 348.137611] name failslab, interval 1, probability 0, space 0, times 0 [ 348.155291] CPU: 0 PID: 11811 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 348.163235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.172596] Call Trace: [ 348.175203] dump_stack+0x1b2/0x283 [ 348.178854] should_fail.cold+0x10a/0x154 [ 348.183020] should_failslab+0xd6/0x130 [ 348.187017] kmem_cache_alloc_node+0x25f/0x400 [ 348.191619] __alloc_skb+0x9a/0x4c0 [ 348.195264] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 348.200173] ? netlink_has_listeners+0x1ff/0x310 [ 348.204922] kobject_uevent_env+0x6d1/0xc50 [ 348.209311] lo_ioctl+0x1177/0x1c00 [ 348.212926] ? loop_clr_fd+0xac0/0xac0 [ 348.216806] blkdev_ioctl+0x91d/0x17c0 [ 348.220686] ? blkpg_ioctl+0x8d0/0x8d0 [ 348.224559] ? trace_hardirqs_on+0x10/0x10 [ 348.228784] block_ioctl+0xd9/0x120 [ 348.232396] ? blkdev_fallocate+0x3a0/0x3a0 [ 348.236749] do_vfs_ioctl+0x75a/0xfe0 [ 348.240541] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 348.246152] ? ioctl_preallocate+0x1a0/0x1a0 [ 348.250551] ? security_file_ioctl+0x76/0xb0 [ 348.254945] ? security_file_ioctl+0x83/0xb0 [ 348.259338] SyS_ioctl+0x7f/0xb0 [ 348.262699] ? do_vfs_ioctl+0xfe0/0xfe0 [ 348.266767] do_syscall_64+0x1d5/0x640 [ 348.270662] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 348.275846] RIP: 0033:0x45c927 [ 348.279028] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 11:07:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000011c0), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = dup(r1) write$UHID_CREATE(r2, &(0x7f0000000000)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000001c0)=""/4096, 0x1000, 0x6, 0x2, 0x9, 0x800, 0x8}}, 0x120) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) ioctl$TIOCL_GETSHIFTSTATE(r3, 0x541c, &(0x7f0000000140)={0x6, 0x6}) [ 348.286717] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 348.293974] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 348.301226] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 348.308482] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 348.315737] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000004840)=[{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="c08513f9f51d08d3bc64c7097c4339c3da769b20b148505c2ea4a8c1471e62b5a95732bf5151ccded93c3a3c14022b14d6de97ff4b91202c0d0bc60119f04a50381a5a07", 0x44}, {&(0x7f0000000080)="539c326c860ed8df839a1b8f", 0xc}, {&(0x7f00000001c0)="90a0d2089b2ce51386bc0c894cad2b16fde86102d1d0d65af0b0bd3c0b356d325140d470a6d68320de53f142e255c7b928e7bfff69497d3175900bf0136e638ad4766859eb68d6a5299e2d77ea93fc812c00e2357c7870cb05c66fa70c6ecdfaa6e9197fdb563003023f83903fb4c0d018cb976270d05eac6258bd239937366f709f788aa0acd50f61af85f7ad37c116cc0a75baab20f8d3bb32e4de0fbc290a69dfafa0d76c415b80b92fdea0cc3da92916b833105d135c052697bb7c54375e057b3646fd7196eaf5af9f59bf13377951a4d4ca01204444c625dee344605060c8b1e29a2ff3e142ea0a37a0d6cfe055d0c32b40", 0xf4}, {&(0x7f00000000c0)="c9551946b065c45d6ddba83f87e05e83057f5aaa50488403dd8cd25c3538e3c2a6f7f2b461a3e8cb63c90eaa6d92dd02d4a9f0bf34b045b7e838fce0d6438f25a7775f67ba56bb3ad7fa2586b59fc3029b6ac02fa6a755a068c4c43ab33eb669ac67", 0x62}, {&(0x7f00000002c0)="98c34183beb67166bc6f644fc09be596184e46cc39d054e0353c770a67e471e2b499d5afaa31a8194a8105b49f70fbc7f82e4805526e4fd827cf3b0f668f3025dcd9f66667364231b863c89939161411d659573ff25360989835be6dea1debf7df92cae6c558e02f76e65058c59151f6e6c9bdde8207e3f73ec4eead4be7164ea664cf10db7f9e77749b921edf0152874b255c1d971a6ca9170ea0700128f067bf73211a6dca8c66ea1ee2026256faa4b7", 0xb1}], 0x5, &(0x7f0000000400)=[@assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0xfff}, @iv={0xd8, 0x117, 0x2, 0xbf, "923be022078c4b9003105c22e7d5e8027770d4d5ac868227530dc44ac73444510b846a6967e41b6ea94193ee5072504bdb9903c0b29bb24abea8f30dddd1be5288cac7960a8998a71a6aa4a0b81fca1581572e5c47eadd4db741027e3a5ed2762d8c38399e5e66b2071658f8e0463e6e4b18031c10f0f0aaa3e1175a8fc37a5a49e887ebc749f3d5027e0e9b9ef2d67fe07fe6129862bb65081cc955c9d1a77122d755c430f74597162b0eb7232d4f03695e72553e116e71f1059aa0b2a56b"}, @assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x9}], 0x138, 0x20000000}, {0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)="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", 0x1000}], 0x1, &(0x7f0000001540)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x20}, @op={0x18, 0x117, 0x3, 0x1}], 0x48, 0x80}, {0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f00000032c0)="d505809e3fe0c5de6ced753dc81c4bc2f27132c7b82c4f8c9f707949dca17010e1dec05b9c18c526776d3c12bf910c4fedb7ec5d3e3b163f5ca60a69aba27b262fb0ea8d6032e6c97b0bdf72174b49343757c564509df8723b6ae0ed6ff6bcb1b982c68f44ec0511", 0x68}, {&(0x7f0000001640)="12f282574b86f5904adbc318f1a9661bd78bcf4de51d584686069163daf43056a499a0f2337877d6f1ce80fd7b09ef6e86704f0cff35550603115d36cdbca830e1cd62d2ce5dbe6f06d6a73f3dd0b350b48628adb89baee6f54bd769c3b56b1875b358608e6ea28aa4707baea627681cedaf464b295c80b19c4d4b18cfdc65fb127f691538cff0aaed756616aec16287c3113572d4059293f3e3cfb75ac653b8a2c48a0da3d4797ab3d9a34db8486f83281db7530641cb1d242b9da3c99b8a0b2424f0d9f33b5816851b3d7068c4570dd33d3d302aba6bfdba2a", 0xda}, {&(0x7f0000001740)="834a97c9a227fa3526609ff7bd2b146440670f599b5c5976452bde91cdf4e5fb6b8fd90e718b9ab5510edfd0333c97f1886f5070a8c18332566374575973f323f3392af1792d01620ef18b9d12c10a0984ff4d6535fdec63c117d2bd7ea9a78ac6b39ef40484b86d3b0b0750f8b9519604c01c83b2f94f3ebdfa13e01851cfb7ec423bf778340a7a7e578c92a7a8a2d45bedf36595b277a740b55c1f5bade84e1f0beb9b8c112818c09127e852b313f357b5f0bad4b94708", 0xb8}, {&(0x7f0000001800)="b07d1916fdb071326b87db4f142d15ed77f2104ffe27d93798e82fc23b05f9316ceb37400d876e56ff3f667cca04b34b163e21da0994e08e1a2cf540a1aa9433938d9862b580d905c1f0e07844146e7855a0b9b545965af1bce8c490cf3aa6ffded782098152b5a5d776e61f4be877f396be1d81846ce5d9b6b0e19c7b94126a7ce8f9620f5fc5811002b51070ea42c1b3926fb24fc9fea2d593f5533013f87feccff98a8515637164b17e3124ba877b235a771be2f4a7a00eeac13572ef019b4c3cfdcb", 0xc4}, {&(0x7f0000001900)="d20e050a44d5344d44eea43142781e0819c6c7c61927d3c4de93230a829605b1918d0688e6ef1e16a72aa05828f13d8d915bea98115d6ec69438458980d09b8796bd1ca687a5c7d6999b57bc57e6b00026b9933493ebc3130b384f5bd40469404eebf048be31de909da1e799de6876a45b05458b8fd94ab650996257f1b66f8ff20e84412d10915482a9f9a3472417089c16f762b57ed7a8615b2457137c984efdb547f5686549b55ad882243b52f0d6ddc38fcaed6016059c1e3361e61d0f770afda689d4d7d4aa9785ba596126666c98bf4e33e0cadce7fcec63a82836", 0xde}], 0x5, &(0x7f0000001a80)=[@iv={0xa8, 0x117, 0x2, 0x8d, "2a7a91b2f03c17e45dcaed24bd0cc10af4764f981949183f738772cdb5119984768781ced1ce88d4ee537ce64e7bcf893c9b38a9a59e62975436b148fa92f4c82827195e61f0542e1407965216c68af3eba707f0d326d347e3efa5dc8196dfa3054c6876178cf297208591b70a49b66be545a0dbb7b2ec27744428ebf89eed9eaf11424fa6b2e1f1302ff25da5"}], 0xa8, 0x20048000}, {0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000001b40)="176da4506a719ea34c754a486b5f4ac7c7cc4a95a3560400c30fa1f7954a7323f14677e294c41f546c74563b55d0e6e5e509316d5e7a214510c332c2c046d51d290c94f114621cdb400d6b7bfd9e9236f2e72a7f6c073e241d1c0ee2006b2e89a0c777f439543c9da519edbe918b1db00a8e5d65219091c7bf2165b08092fc34f2e056ddee422ed76799c4df6c4b8465f335000b99eb4bbac8eae34e19fef65030e0f926ddfa5c370d15e71e34541e8d8748f93b20984b31e9dfb3296b07b7c845bb17a52f82132e9eef2ad79745ea6c571516f54e03c25489bea4b56364c51053fb411992e4c9", 0xe7}, {&(0x7f0000001c40)="a0924c41b2bf6406c682d620e3cabd638736e083eaac6c84580d158d66505178c1258b05bd298029ca1217feaae32c", 0x2f}, {&(0x7f0000001c80)="d0021d666e4f72126b3cf15cbc1af651f8bb03075885323af6a0fd6eaf4079c07ba3bcd72da33b10fdfc1c09deee2ba8661c4c1ba9b9e5dea865fb7e3232c4db0bf0ac177820f7bcd4efb138c8644025eb9d8225ec55464e9c9ab061f5b995860d8e4065a672f3a61a7b6913ecfa7456865e568bfee0416de28a6162394eb6d45677492aefc80dd4b6307105132a1149bab2bd458310abd60edae6c0e0354b817ffc9a1b1bb2c38aed10d4631547aaa14e281379d23a31663e48cc2b6e11769ca54d5784f0ce9c97c41fd24a297811219bb2df959990967ac237822cf3376552db46d4a7888d", 0xe6}, {&(0x7f0000001d80)="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", 0x1000}, {&(0x7f0000002d80)="7a09229e60b6bbb27b38562aa7a7c843f494b6f9347efca90b4363af9981a9ff0fbc8a1ec2de47df77a36b301a158a28ff536c7fe23a713c036d2e8d58cbd4bd68cc3aece1fd1b075efa041b1e3a8140c763f559953e9d8fcc325fb56015e7b4f9d486eff8e884de94c11bf35d61b78cdc46908070d24142984a29df9d84378c008fa3716975383c68cc0d38ba83a8c31ad4615af05324af682321903880564c5ca9e5cbcdd0d4197102a072dcd7d8", 0xaf}, {&(0x7f0000002e40)="23fae442d7381922952454a36791d9fd579b52401116c084d47c829ca10ed670d25ce4edae5328283d3c860ffcbcdee3525d0c64f22474e0f60bb69b1821ac9d69825f9d0be14390b5f0b8f4b9d0a6433ae1fbacdd809f6d7c9e363b78117c91dbe7b0d7526ac7ee566243c66ab35d80507a87417a2c1e5ff278bb9ca7d96202a238989b6fe7dfd5f6e316a64c230b87eb4e4d3f68bdf63c33539c1ef239f851ac1c94ab47f4a37040aa6dec02327fe3aeb2e3b72bfe480c37c78469831485a7a2eeca18aa0f9da7c2cb141e4af419bf9fb0a884", 0xd4}], 0x6, &(0x7f0000002fc0)=[@iv={0xc8, 0x117, 0x2, 0xb4, "27f747a7e5e42329eb5fef0f5f13013dd86f34c169655e367df5b625f7edb3c91804f6d304736f63408598a11c6690bba85b1785dcccb6bb93bc3af0f66a7ec42ba389d296e3df6b823de325c204d4d070ce131c81b452807809dde7312eea28721acde9a0da6778e54d17109e44b1f2778ad829b94b0b857f6903e1a2618e9b31f25d7d3e42c33c5b900c1c8465a30c2430a091bf3382cf919b39c1f074578dc871d1e6ce9a5eca09446df39e5a21b328b4e174"}, @assoc={0x18, 0x117, 0x4, 0x2}, @iv={0xe8, 0x117, 0x2, 0xd0, "6fe2b2c237e7cd28ec895eb82fa210eacc80c1f01439ce6d431bf00dd34f5dc32df99be8513630f7c735dde230df603642abbbd0482d6893d110c664cc12f821b308d8dce19f464948853e82ea1ac0cbce3cb45680fbb5af731fd1052607674d09632e1f7759affb245fbef4751b85835857a314df00b8efa78b63674cc5642d62375aed1d60e7f3cc6d4c268ed5fed23a1f4a1c49632f8a623a5548e1ba794cf1d03d8f5318922df0e30f42d49cb8450a53be23a8c8662a9385a63449b96788123fb78dc94f7d49fddd45efc757a11c"}], 0x1c8, 0x24040095}, {0x0, 0x0, &(0x7f0000003280)=[{&(0x7f00000031c0)="7702918f67bd3fef61ea2eb0dd9dc52db0ca21f76b2efb69e1d49565d84f40d58d12e2b92657cd11546025d26ab6f0b8736c266b59640c23b057481ff82b", 0x3e}, {&(0x7f0000003200)="fe1f02a0e426b924b2845cdeaebbe98d7817b06524ab0c7f963524766df007cb9573495e003cfad7f7a9ecee822dc251d033d48cc253d7b708019051757234ad01203c66b06efb0abe4a0e", 0x4b}], 0x2, &(0x7f00000049c0)=[@iv={0x238, 0x117, 0x2, 0x21e, "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"}, @op={0x18}], 0x250, 0x4}, {0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000003400)="aedb2eeb032ed33ea438caf2a48a44e078c8f12d10b60e32280359325fd23c725365bcb642810cd75c784b606755e6f6e54e5dad463f7818870aac00e40e52b19d87f1ee080f6c230448ae8f546dc8407e35418c8a47", 0x56}, {&(0x7f0000003480)="3c8e13856fae82fd5b51438fa8be0d1a07d6d2fbd7df8e43f6006a35ab1e0fbebb499117c0d1d4a1c761da27afaad482b7d29e4515b453cf556fa2e11acbad84390d057c6987e9d2a33b98e5a429df31744df7ffeb5f9441533166e39720ce1f47dd13502cdf70676c1e0d2f903177b3eb3cd1ff9de24be88b9345e034913dca00f722fe096743219b0ee9acd32b7fd2d84ae7afea7d306bda1f4211b5127273403f90378d01dc7763bb8384d79f656e8e8c1423148ec2c2d546885010518396ed57c21e31d48fdf97cb9212377033e4ac6038", 0xd3}, {&(0x7f0000003580)="caeb6b1521daed8d8c6e919dc1cd575db18c5997bcad8339501031f69b8311d1a481d15b7eb05be7242b06d9ff05c7a175429e72a83df84319dd1e4a2a2000fbdd61d16df2ef30c28b9daa26fe505feb1e268c702eea2c801fe4e2beb89d7f15d2870de456867ee5b6cebb8b44b1d61fcac355b8b04bb3e4a40d784723030442837c21bdc8d17067d913ef90241f9e87ca32433c1820c6f2a3bdc3423cfc31013a861b05f7b831d8c9ff35e7ee56c80afd65428cf39841c6fb0e402a", 0xbc}, {&(0x7f0000003640)="eb277076ac165a46fa4c0ea72f6de01a994bbb9d74fdfb57c11b98f8c71cf35ff790b495cbf412de86521b5d4f917237828478f2380d72c139f99992429beaea50de0e60855fce301f1bcceebe868860bc75f2c24ececb6c8c3866267ae9ed1cbcdeb3e986a24bbe90a30aba9d1a71d3687f7fb0bd5fad839a8b5cf6f87e8949a6193e33cc825e4b2a6c1d3751aafd5c724f431e87af74fc081f04e80a8d543655d16c843ab76d6245072991e3a2c7f030b35979fbed66f3a1", 0xb9}, {&(0x7f0000003700)="4be0b17a179dff04e142f85ad1b8e19b8bcc92b28640decd644d708f7d81e0e9c28cfbff2ccac133ad72c43ed5b05e06555afdcd05a301e7f62da662065b81d1d42d030b1cd952d5e56e0d64ee4a351c45a6b2a0a3bdcaab0f92bb84262bc05c9f2e593faeda9eed0358941b25e162760b1748d2d05ffdd3a2fa8444", 0x7c}, {&(0x7f0000003780)="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", 0x1000}, {&(0x7f0000004780)="3aa7ecac2ad73f846a3194a00ba46ed6b4e1c2a67b9f", 0x16}], 0x7, 0x0, 0x0, 0x20000000}], 0x6, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 348.355255] BTRFS error (device loop5): superblock checksum mismatch 11:07:43 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 348.409399] BTRFS error (device loop5): open_ctree failed 11:07:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x9, 0x0, 0x7ff) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 348.522057] FAULT_INJECTION: forcing a failure. [ 348.522057] name failslab, interval 1, probability 0, space 0, times 0 [ 348.543391] CPU: 1 PID: 11851 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 348.551320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.560682] Call Trace: [ 348.563287] dump_stack+0x1b2/0x283 [ 348.566936] should_fail.cold+0x10a/0x154 [ 348.571104] should_failslab+0xd6/0x130 [ 348.575086] kmem_cache_alloc_node_trace+0x25a/0x400 [ 348.580198] __kmalloc_node_track_caller+0x38/0x70 [ 348.585158] __kmalloc_reserve.isra.0+0x35/0xd0 [ 348.589834] __alloc_skb+0xca/0x4c0 [ 348.593470] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 348.598324] ? netlink_has_listeners+0x1ff/0x310 [ 348.603091] kobject_uevent_env+0x6d1/0xc50 [ 348.607433] lo_ioctl+0x1177/0x1c00 [ 348.611069] ? loop_clr_fd+0xac0/0xac0 [ 348.614967] blkdev_ioctl+0x91d/0x17c0 [ 348.618859] ? blkpg_ioctl+0x8d0/0x8d0 [ 348.622756] ? trace_hardirqs_on+0x10/0x10 [ 348.627009] block_ioctl+0xd9/0x120 [ 348.630641] ? blkdev_fallocate+0x3a0/0x3a0 [ 348.634969] do_vfs_ioctl+0x75a/0xfe0 [ 348.638898] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 348.644529] ? ioctl_preallocate+0x1a0/0x1a0 [ 348.648963] ? security_file_ioctl+0x76/0xb0 [ 348.653376] ? security_file_ioctl+0x83/0xb0 [ 348.657791] SyS_ioctl+0x7f/0xb0 [ 348.661154] ? do_vfs_ioctl+0xfe0/0xfe0 [ 348.665138] do_syscall_64+0x1d5/0x640 [ 348.669037] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 348.674227] RIP: 0033:0x45c927 [ 348.677410] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.685120] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 348.692390] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 348.699670] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 348.706951] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 348.714220] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 348.753856] BTRFS error (device loop5): superblock checksum mismatch 11:07:44 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 348.795852] BTRFS error (device loop5): open_ctree failed [ 348.890325] FAULT_INJECTION: forcing a failure. [ 348.890325] name failslab, interval 1, probability 0, space 0, times 0 [ 348.904355] CPU: 0 PID: 11865 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 348.909183] print_req_error: I/O error, dev loop5, sector 0 [ 348.912286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.918585] print_req_error: I/O error, dev loop5, sector 0 [ 348.927422] Call Trace: [ 348.927447] dump_stack+0x1b2/0x283 [ 348.927465] should_fail.cold+0x10a/0x154 [ 348.927480] should_failslab+0xd6/0x130 [ 348.927489] kmem_cache_alloc_node+0x25f/0x400 [ 348.927504] __alloc_skb+0x9a/0x4c0 [ 348.927516] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 348.927529] ? netlink_has_listeners+0x1ff/0x310 [ 348.927539] kobject_uevent_env+0x6d1/0xc50 [ 348.927557] lo_ioctl+0x1177/0x1c00 [ 348.927570] ? loop_clr_fd+0xac0/0xac0 [ 348.927585] blkdev_ioctl+0x91d/0x17c0 [ 348.933300] Buffer I/O error on dev loop5, logical block 0, async page read [ 348.935886] ? blkpg_ioctl+0x8d0/0x8d0 [ 348.935898] ? trace_hardirqs_on+0x10/0x10 [ 348.935917] block_ioctl+0xd9/0x120 [ 348.935925] ? blkdev_fallocate+0x3a0/0x3a0 [ 348.935933] do_vfs_ioctl+0x75a/0xfe0 [ 348.935944] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 348.935953] ? ioctl_preallocate+0x1a0/0x1a0 [ 348.935971] ? security_file_ioctl+0x76/0xb0 [ 348.947164] print_req_error: I/O error, dev loop5, sector 0 [ 348.947702] ? security_file_ioctl+0x83/0xb0 [ 348.952333] Buffer I/O error on dev loop5, logical block 0, async page read [ 348.955912] SyS_ioctl+0x7f/0xb0 [ 348.955924] ? do_vfs_ioctl+0xfe0/0xfe0 [ 348.955938] do_syscall_64+0x1d5/0x640 [ 348.955955] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 348.955964] RIP: 0033:0x45c927 [ 348.955969] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.955979] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 348.955983] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 348.955987] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 348.955993] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 348.955997] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 349.110245] BTRFS error (device loop5): superblock checksum mismatch [ 349.146735] BTRFS error (device loop5): open_ctree failed 11:07:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) finit_module(r1, &(0x7f0000000000)='\\%\x00', 0x3) 11:07:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:46 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x2, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0xa8000) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 351.199829] FAULT_INJECTION: forcing a failure. [ 351.199829] name failslab, interval 1, probability 0, space 0, times 0 [ 351.232942] CPU: 1 PID: 11902 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 351.240872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.250236] Call Trace: [ 351.252844] dump_stack+0x1b2/0x283 [ 351.256491] should_fail.cold+0x10a/0x154 [ 351.260664] should_failslab+0xd6/0x130 [ 351.264654] kmem_cache_alloc_node_trace+0x25a/0x400 [ 351.269786] __kmalloc_node_track_caller+0x38/0x70 [ 351.274742] __kmalloc_reserve.isra.0+0x35/0xd0 [ 351.279432] __alloc_skb+0xca/0x4c0 [ 351.283084] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 351.287942] ? netlink_has_listeners+0x1ff/0x310 [ 351.292720] kobject_uevent_env+0x6d1/0xc50 [ 351.297094] lo_ioctl+0x1177/0x1c00 [ 351.300743] ? loop_clr_fd+0xac0/0xac0 [ 351.304642] blkdev_ioctl+0x91d/0x17c0 [ 351.308541] ? blkpg_ioctl+0x8d0/0x8d0 [ 351.312444] ? trace_hardirqs_on+0x10/0x10 [ 351.316702] block_ioctl+0xd9/0x120 [ 351.320343] ? blkdev_fallocate+0x3a0/0x3a0 [ 351.324680] do_vfs_ioctl+0x75a/0xfe0 [ 351.328500] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 351.334141] ? ioctl_preallocate+0x1a0/0x1a0 [ 351.338581] ? security_file_ioctl+0x76/0xb0 [ 351.343015] ? security_file_ioctl+0x83/0xb0 [ 351.347442] SyS_ioctl+0x7f/0xb0 11:07:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) r2 = getpid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x9, 0x0, 0xfb, 0xe9, 0x0, 0x5, 0x7ab2cf01b690df38, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000480), 0x2}, 0x2000, 0x1, 0x2, 0x2, 0xda, 0x23, 0xfff}, 0x0, 0xd, r0, 0xb) sched_setattr(r2, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0xad}, 0x0) setpriority(0x0, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x14, r5, 0xab9535e9a6578fc1, 0x0, 0x0, {0x6b}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x44) getpriority(0x1, r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r3, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000001, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2}, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x7, 0x1ff, 0x1}, &(0x7f0000000300)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x7}}, 0x10) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 351.350810] ? do_vfs_ioctl+0xfe0/0xfe0 [ 351.354809] do_syscall_64+0x1d5/0x640 [ 351.358702] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 351.363894] RIP: 0033:0x45c927 [ 351.367100] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 351.374824] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 351.382114] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 351.389400] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 351.396678] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 351.403964] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 351.431842] BTRFS error (device loop5): superblock checksum mismatch [ 351.525407] BTRFS error (device loop5): open_ctree failed 11:07:47 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 351.633849] FAULT_INJECTION: forcing a failure. [ 351.633849] name failslab, interval 1, probability 0, space 0, times 0 [ 351.645784] CPU: 1 PID: 11933 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 351.652568] print_req_error: I/O error, dev loop5, sector 0 [ 351.653679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.653684] Call Trace: [ 351.653705] dump_stack+0x1b2/0x283 [ 351.653721] should_fail.cold+0x10a/0x154 [ 351.653736] should_failslab+0xd6/0x130 [ 351.683100] kmem_cache_alloc_node+0x25f/0x400 [ 351.687695] __alloc_skb+0x9a/0x4c0 [ 351.691338] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 351.695007] print_req_error: I/O error, dev loop5, sector 0 [ 351.696184] ? netlink_has_listeners+0x1ff/0x310 [ 351.696197] kobject_uevent_env+0x6d1/0xc50 [ 351.696218] lo_ioctl+0x1177/0x1c00 [ 351.696233] ? loop_clr_fd+0xac0/0xac0 [ 351.696244] blkdev_ioctl+0x91d/0x17c0 [ 351.696252] ? blkpg_ioctl+0x8d0/0x8d0 [ 351.696265] ? trace_hardirqs_on+0x10/0x10 [ 351.701969] Buffer I/O error on dev loop5, logical block 0, async page read [ 351.706720] block_ioctl+0xd9/0x120 [ 351.706730] ? blkdev_fallocate+0x3a0/0x3a0 [ 351.706738] do_vfs_ioctl+0x75a/0xfe0 [ 351.706751] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 351.706760] ? ioctl_preallocate+0x1a0/0x1a0 [ 351.706778] ? security_file_ioctl+0x76/0xb0 [ 351.706785] ? security_file_ioctl+0x83/0xb0 [ 351.706794] SyS_ioctl+0x7f/0xb0 [ 351.706802] ? do_vfs_ioctl+0xfe0/0xfe0 [ 351.706814] do_syscall_64+0x1d5/0x640 11:07:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000002400), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) clock_gettime(0x0, &(0x7f0000002040)={0x0, 0x0}) futex$FUTEX_WAIT_MULTIPLE(&(0x7f00000019c0)=[{&(0x7f0000000000), 0x2}, {&(0x7f0000000040)=0x2, 0x1}, {&(0x7f0000000080)=0x1, 0x2}, {&(0x7f00000000c0), 0x1}, {&(0x7f0000000100), 0x1}, {&(0x7f0000000140)=0x2, 0x2}, {&(0x7f00000001c0)=0x1}, {&(0x7f0000000200)=0x1, 0x1}, {&(0x7f0000000240)=0x2, 0x8}, {&(0x7f0000000280)=0x2, 0x2}, {&(0x7f00000002c0)=0x2}, {&(0x7f0000000300)=0x1, 0x2}, {&(0x7f0000000340), 0x1}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=0x2, 0x1}, {&(0x7f0000000400)=0x2}, {&(0x7f0000000440)=0x2, 0x2}, {&(0x7f0000000480), 0x2}, {&(0x7f00000004c0)=0x2, 0x2}, {&(0x7f0000000500)=0x2, 0x1}, {&(0x7f0000000540)=0x1}, {&(0x7f0000000580), 0x2}, {&(0x7f00000005c0), 0x2}, {&(0x7f0000000600)=0x2, 0x2}, {&(0x7f0000000640)=0x1, 0x2}, {&(0x7f0000000680)}, {&(0x7f00000006c0)=0x1}, {&(0x7f0000000700)=0x2}, {&(0x7f0000000740), 0x1}, {&(0x7f0000000780)=0x2, 0x2}, {&(0x7f00000007c0)=0x2, 0x1}, {&(0x7f0000000800)=0x1, 0x2}, {&(0x7f0000000840)=0x1, 0x2}, {&(0x7f0000000880)}, {&(0x7f00000008c0)=0x2}, {&(0x7f0000000900)}, {&(0x7f0000000940)=0x2, 0x1}, {&(0x7f0000000980)=0x1}, {&(0x7f00000009c0)=0x1, 0x2}, {&(0x7f0000000a00)}, {&(0x7f0000000a40)=0x2, 0x2}, {&(0x7f0000000a80)=0x1, 0x1}, {&(0x7f0000000ac0)}, {&(0x7f0000000b00)=0x2}, {&(0x7f0000000b40)=0x2}, {&(0x7f0000000b80)=0x2, 0x1}, {&(0x7f0000000bc0), 0x2}, {&(0x7f0000000c00)=0x1, 0x1}, {&(0x7f0000000c40)=0x2}, {&(0x7f0000000c80)=0x1, 0x1}, {&(0x7f0000000cc0)=0x2}, {&(0x7f0000000d00)=0x2}, {&(0x7f0000000d40)}, {&(0x7f0000000d80)=0x2, 0x2}, {&(0x7f0000000dc0)=0x2, 0x1}, {&(0x7f0000000e00)=0x2, 0x1}, {&(0x7f0000000e40)=0x2, 0x1}, {&(0x7f0000000e80)=0x1, 0x2}, {&(0x7f0000000ec0)=0x1, 0x1}, {&(0x7f0000000f00)=0x2, 0x1}, {&(0x7f0000000f40), 0x2}, {&(0x7f0000000f80)=0x1}, {&(0x7f0000000fc0), 0x2}, {&(0x7f0000001000), 0x1}, {&(0x7f0000001040)=0x2}, {&(0x7f0000001080)=0x1, 0x1}, {&(0x7f00000010c0), 0x2}, {&(0x7f0000001100)=0x1}, {&(0x7f0000001140)}, {&(0x7f0000001180)}, {&(0x7f00000011c0)=0x2}, {&(0x7f0000001200), 0x2}, {&(0x7f0000001240)=0x1, 0x1}, {&(0x7f0000001280)=0x2, 0x1}, {&(0x7f00000012c0)=0x2, 0x1}, {&(0x7f0000001300)=0x2, 0x1}, {&(0x7f0000001340)=0x2, 0x2}, {&(0x7f0000001380)=0x5, 0x1}, {&(0x7f00000013c0)=0x1}, {&(0x7f0000001400)=0x2, 0x3}, {&(0x7f0000001440), 0x1}, {&(0x7f0000001480)}, {&(0x7f00000014c0), 0x2}, {&(0x7f0000001500), 0x2}, {&(0x7f0000001540), 0x1}, {&(0x7f0000001580)=0x1, 0x1}, {&(0x7f00000015c0)=0x6}, {&(0x7f0000001600), 0x2}, {&(0x7f0000002340)=0x1}, {&(0x7f0000001680), 0x2}, {&(0x7f00000016c0)=0x2}, {&(0x7f0000001700)=0x1, 0x1}, {&(0x7f0000001740)=0x1, 0x1}, {&(0x7f0000001780)=0x2, 0x1}, {&(0x7f00000017c0)=0x1, 0x2}, {&(0x7f0000001800), 0x1}, {&(0x7f0000001840), 0x2}, {&(0x7f0000001880)=0x2, 0x4}, {&(0x7f00000018c0)=0x1, 0x2}, {&(0x7f0000001900)=0x1, 0x1}, {&(0x7f0000001940)=0x2, 0x2}, {&(0x7f0000001980)=0x2, 0x1}], 0xd, 0x66, &(0x7f0000002080)={r1, r2+10000000}, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002440)=ANY=[@ANYBLOB="280000001d0001000000004e034a70be0d2b9b49001aba00"/36, @ANYRES32=r6, @ANYBLOB="00000a000a0002000180c20000000000"], 0x28}}, 0x0) bind(r0, &(0x7f0000002380)=@xdp={0x2c, 0x0, r6, 0x33}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0x400086) recvmsg(r7, &(0x7f0000002300)={0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f00000020c0)=""/76, 0x4c}, {&(0x7f0000002140)=""/213, 0xd5}, {&(0x7f0000002240)=""/81, 0x51}], 0x3}, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r5, 0x118, 0x0, &(0x7f0000001640)=0x7d6, 0x4) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 351.706830] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 351.706837] RIP: 0033:0x45c927 [ 351.706842] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 351.723405] print_req_error: I/O error, dev loop5, sector 0 [ 351.726388] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 351.726395] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 351.726400] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 351.726406] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 351.726412] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 351.840111] Buffer I/O error on dev loop5, logical block 0, async page read [ 351.851651] BTRFS error (device loop5): superblock checksum mismatch 11:07:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 351.895509] BTRFS error (device loop5): open_ctree failed 11:07:47 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 351.985212] FAULT_INJECTION: forcing a failure. [ 351.985212] name failslab, interval 1, probability 0, space 0, times 0 [ 351.987370] print_req_error: I/O error, dev loop5, sector 0 [ 352.001153] CPU: 1 PID: 11960 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 352.010263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.011766] print_req_error: I/O error, dev loop5, sector 0 [ 352.019621] Call Trace: [ 352.019644] dump_stack+0x1b2/0x283 [ 352.019660] should_fail.cold+0x10a/0x154 [ 352.019673] should_failslab+0xd6/0x130 [ 352.019683] kmem_cache_alloc_node_trace+0x25a/0x400 [ 352.019695] __kmalloc_node_track_caller+0x38/0x70 [ 352.019710] __kmalloc_reserve.isra.0+0x35/0xd0 [ 352.025856] Buffer I/O error on dev loop5, logical block 0, async page read [ 352.028005] __alloc_skb+0xca/0x4c0 [ 352.028018] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 352.028032] ? netlink_has_listeners+0x1ff/0x310 [ 352.031865] print_req_error: I/O error, dev loop5, sector 0 [ 352.035784] kobject_uevent_env+0x6d1/0xc50 [ 352.035806] lo_ioctl+0x1177/0x1c00 [ 352.035818] ? loop_clr_fd+0xac0/0xac0 [ 352.035830] blkdev_ioctl+0x91d/0x17c0 [ 352.035838] ? blkpg_ioctl+0x8d0/0x8d0 [ 352.035850] ? trace_hardirqs_on+0x10/0x10 [ 352.039814] Buffer I/O error on dev loop5, logical block 0, async page read [ 352.044915] block_ioctl+0xd9/0x120 [ 352.050755] print_req_error: I/O error, dev loop5, sector 0 [ 352.054634] ? blkdev_fallocate+0x3a0/0x3a0 [ 352.054648] do_vfs_ioctl+0x75a/0xfe0 [ 352.054661] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 352.054672] ? ioctl_preallocate+0x1a0/0x1a0 [ 352.061893] Buffer I/O error on dev loop5, logical block 0, async page read [ 352.065429] ? security_file_ioctl+0x76/0xb0 [ 352.065439] ? security_file_ioctl+0x83/0xb0 [ 352.065454] SyS_ioctl+0x7f/0xb0 [ 352.070585] Buffer I/O error on dev loop5, logical block 0, async page read [ 352.075026] ? do_vfs_ioctl+0xfe0/0xfe0 [ 352.075041] do_syscall_64+0x1d5/0x640 [ 352.075057] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 352.075067] RIP: 0033:0x45c927 [ 352.081037] Buffer I/O error on dev loop5, logical block 0, async page read [ 352.085069] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 352.085081] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 352.085086] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 352.085092] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 352.085097] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 352.085105] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 352.088931] Buffer I/O error on dev loop5, logical block 0, async page read [ 352.248223] BTRFS error (device loop5): superblock checksum mismatch [ 352.305634] BTRFS error (device loop5): open_ctree failed 11:07:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) fadvise64(r0, 0x809, 0x3, 0x3) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:49 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 354.152347] FAULT_INJECTION: forcing a failure. [ 354.152347] name failslab, interval 1, probability 0, space 0, times 0 [ 354.192835] print_req_error: 3 callbacks suppressed [ 354.192842] print_req_error: I/O error, dev loop5, sector 0 [ 354.211135] CPU: 0 PID: 11983 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 354.217494] print_req_error: I/O error, dev loop5, sector 0 [ 354.219055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.219060] Call Trace: [ 354.219080] dump_stack+0x1b2/0x283 [ 354.219096] should_fail.cold+0x10a/0x154 [ 354.224802] Buffer I/O error on dev loop5, logical block 0, async page read [ 354.234159] should_failslab+0xd6/0x130 [ 354.234171] kmem_cache_alloc_node_trace+0x25a/0x400 [ 354.234182] __kmalloc_node_track_caller+0x38/0x70 [ 354.234195] __kmalloc_reserve.isra.0+0x35/0xd0 [ 354.234206] __alloc_skb+0xca/0x4c0 [ 354.234215] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 354.234227] ? netlink_has_listeners+0x1ff/0x310 [ 354.234239] kobject_uevent_env+0x6d1/0xc50 11:07:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 354.243361] print_req_error: I/O error, dev loop5, sector 0 [ 354.244573] lo_ioctl+0x1177/0x1c00 [ 354.244588] ? loop_clr_fd+0xac0/0xac0 [ 354.244600] blkdev_ioctl+0x91d/0x17c0 [ 354.251739] Buffer I/O error on dev loop5, logical block 0, async page read [ 354.255652] ? blkpg_ioctl+0x8d0/0x8d0 [ 354.255663] ? trace_hardirqs_on+0x10/0x10 [ 354.255684] block_ioctl+0xd9/0x120 [ 354.263398] print_req_error: I/O error, dev loop5, sector 0 [ 354.265846] ? blkdev_fallocate+0x3a0/0x3a0 [ 354.265859] do_vfs_ioctl+0x75a/0xfe0 [ 354.265872] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 354.265881] ? ioctl_preallocate+0x1a0/0x1a0 [ 354.265914] ? security_file_ioctl+0x76/0xb0 [ 354.270586] Buffer I/O error on dev loop5, logical block 0, async page read [ 354.274204] ? security_file_ioctl+0x83/0xb0 [ 354.279421] print_req_error: I/O error, dev loop5, sector 0 [ 354.283763] SyS_ioctl+0x7f/0xb0 [ 354.283774] ? do_vfs_ioctl+0xfe0/0xfe0 [ 354.283788] do_syscall_64+0x1d5/0x640 [ 354.283803] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 354.283814] RIP: 0033:0x45c927 11:07:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 354.288159] Buffer I/O error on dev loop5, logical block 0, async page read [ 354.293957] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 [ 354.297977] print_req_error: I/O error, dev loop5, sector 0 [ 354.301468] ORIG_RAX: 0000000000000010 [ 354.301475] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 354.301479] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 354.301484] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 354.301488] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 11:07:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 354.301494] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 354.449585] Buffer I/O error on dev loop5, logical block 0, async page read [ 354.457146] print_req_error: I/O error, dev loop5, sector 0 [ 354.462912] Buffer I/O error on dev loop5, logical block 0, async page read [ 354.470337] print_req_error: I/O error, dev loop5, sector 24 [ 354.476638] Buffer I/O error on dev loop5, logical block 3, async page read 11:07:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 354.521970] BTRFS error (device loop5): superblock checksum mismatch 11:07:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)='\\.@\x00', 0xfffffffffffffffa) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r5) setfsuid(r5) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000000)={{{@in=@broadcast, @in6=@private2, 0x4e22, 0x0, 0x4e20, 0x0, 0xa, 0xb0, 0x20, 0x6, 0x0, r3}, {0xa6b1, 0x1000, 0x5, 0x100000001, 0xef5f, 0x1, 0x1000, 0x9}, {0x4, 0x6, 0x3, 0x7}, 0x7ff, 0x6e6bc0, 0x0, 0x1}, {{@in=@empty, 0x4d4, 0x32}, 0xf0cdf82b8fad84e1, @in=@broadcast, 0x3506, 0x0, 0x2, 0x8, 0x1, 0x8, 0x1000}}, 0xe8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:50 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 354.577929] BTRFS error (device loop5): open_ctree failed [ 354.715760] FAULT_INJECTION: forcing a failure. [ 354.715760] name failslab, interval 1, probability 0, space 0, times 0 [ 354.730028] print_req_error: I/O error, dev loop5, sector 0 [ 354.731405] CPU: 1 PID: 12027 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 354.736064] print_req_error: I/O error, dev loop5, sector 0 [ 354.743667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.749817] Buffer I/O error on dev loop5, logical block 0, async page read [ 354.758701] Call Trace: [ 354.758722] dump_stack+0x1b2/0x283 [ 354.758738] should_fail.cold+0x10a/0x154 [ 354.758752] should_failslab+0xd6/0x130 [ 354.758762] kmem_cache_alloc_node_trace+0x25a/0x400 [ 354.758774] __kmalloc_node_track_caller+0x38/0x70 [ 354.758786] __kmalloc_reserve.isra.0+0x35/0xd0 [ 354.758797] __alloc_skb+0xca/0x4c0 [ 354.758807] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 354.766421] Buffer I/O error on dev loop5, logical block 0, async page read [ 354.768470] ? netlink_has_listeners+0x1ff/0x310 [ 354.772179] Buffer I/O error on dev loop5, logical block 0, async page read [ 354.776352] kobject_uevent_env+0x6d1/0xc50 [ 354.776373] lo_ioctl+0x1177/0x1c00 [ 354.776385] ? loop_clr_fd+0xac0/0xac0 [ 354.776396] blkdev_ioctl+0x91d/0x17c0 [ 354.776403] ? blkpg_ioctl+0x8d0/0x8d0 [ 354.776413] ? trace_hardirqs_on+0x10/0x10 [ 354.776432] block_ioctl+0xd9/0x120 [ 354.849720] ? blkdev_fallocate+0x3a0/0x3a0 [ 354.854031] do_vfs_ioctl+0x75a/0xfe0 [ 354.857821] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 354.863431] ? ioctl_preallocate+0x1a0/0x1a0 [ 354.867845] ? security_file_ioctl+0x76/0xb0 [ 354.872239] ? security_file_ioctl+0x83/0xb0 [ 354.876634] SyS_ioctl+0x7f/0xb0 [ 354.879987] ? do_vfs_ioctl+0xfe0/0xfe0 [ 354.883951] do_syscall_64+0x1d5/0x640 [ 354.887835] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 354.893013] RIP: 0033:0x45c927 [ 354.896186] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 354.903881] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 354.911132] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 354.918384] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 354.925640] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 354.932900] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 354.970886] BTRFS error (device loop5): superblock checksum mismatch 11:07:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x6, &(0x7f0000002380)=[{&(0x7f0000000080)="77c1be46beb02a11ea3bfc6f3da0f0d7e224322250d73dd68a479a01d3feb2abdda68d952778e945d778ce594e057985840d82c0a87760aa0e410fd6e4d741a35dd28a9aa782cc31caf7854ae10167d0a40fdb2211c31e91edbf1e39a82e8c06a2ab6564c5941a7335b8bc48e02044403c6b50", 0x73, 0xff2}, {&(0x7f00000001c0)="31a3f604ed1262df767b5158614fe56fb4da2952e6081892c6b93d18cba90727494f61fe90ec0be0abfaae6c088a94b39816a65d91446695f8a6b54ebe51806198622546f5680ca0b0f6184d88d3bcb1b17664ca641778d002ad5e7faaad79f7188da7ecc3786021917a829cf8566c0a065baf01a1f587614ce186108353b9b1e1889d4307b1f3566377b27177e5811bcb793ca220e43e4c875fc55bf24846c52b9f9a665c7219ec539709ea4b84e4fcb9912e037dc94c06f723c9d6ea1b3a1adbeb290c9d", 0xc5, 0x14d}, {&(0x7f00000002c0)="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", 0x1000, 0x6}, {&(0x7f0000000100)="1d30566b70eee8488a160ccffde30806516af87cc1b170d006468e654e9c8812986f87d78c804373021f2833aa6d821104c6bb22822d53b35a0868463f41935b0c850119117aff54d88d2825d2c63d48342591b9e5378b9c3a418c086491bf56d6269748fe44c75a55e0dcc32194765d7810c7704120ee874ab62a0ca15f", 0x7e, 0x1}, {&(0x7f00000012c0)="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", 0x1000, 0xa14}, {&(0x7f00000022c0)="91f2d5b8ff61adbb21c210bf6224dce83bb5b81a6edc04910d495203c87a269da66170ecb7689bfa176203ce8208349fa34d963c99a32050c50adedcddab978a621f7bbd71dfbf46f76a68028aff721e182fb6949bf281ac06f526078c844c0f28ce9e9fc4d59604599ed3f12aa002585a7eecdaad3873da88475a73e5739c2fcfa13a912bb20696350167f4bf8ed62044fb91dc29d770007ad445be1034c8b9c552dd3a7646719bd4e8", 0xaa, 0xffffffffffff9333}], 0x1000, &(0x7f0000002440)='\x00') socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 355.015241] BTRFS error (device loop5): open_ctree failed 11:07:52 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x29, 0x1, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) connect$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast]}, 0x48) [ 357.150396] FAULT_INJECTION: forcing a failure. [ 357.150396] name failslab, interval 1, probability 0, space 0, times 0 [ 357.161800] CPU: 0 PID: 12049 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 357.169697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.179065] Call Trace: [ 357.181670] dump_stack+0x1b2/0x283 [ 357.185319] should_fail.cold+0x10a/0x154 [ 357.189594] should_failslab+0xd6/0x130 [ 357.193588] kmem_cache_alloc_node_trace+0x25a/0x400 11:07:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000000)={0x5, 0x70, 0x7b, 0x9, 0x81, 0x1, 0x0, 0x91, 0x200, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x800, 0x85a5}, 0x400, 0x7, 0xe, 0x1, 0x1, 0x8, 0x20}) [ 357.198707] __kmalloc_node_track_caller+0x38/0x70 [ 357.203641] __kmalloc_reserve.isra.0+0x35/0xd0 [ 357.208323] __alloc_skb+0xca/0x4c0 [ 357.211964] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 357.216822] ? netlink_has_listeners+0x1ff/0x310 [ 357.221593] kobject_uevent_env+0x6d1/0xc50 [ 357.225939] lo_ioctl+0x1177/0x1c00 [ 357.229581] ? loop_clr_fd+0xac0/0xac0 [ 357.233483] blkdev_ioctl+0x91d/0x17c0 [ 357.237504] ? blkpg_ioctl+0x8d0/0x8d0 [ 357.241406] ? trace_hardirqs_on+0x10/0x10 [ 357.245667] block_ioctl+0xd9/0x120 [ 357.249313] ? blkdev_fallocate+0x3a0/0x3a0 [ 357.253649] do_vfs_ioctl+0x75a/0xfe0 [ 357.257465] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 357.263111] ? ioctl_preallocate+0x1a0/0x1a0 [ 357.267538] ? security_file_ioctl+0x76/0xb0 [ 357.271965] ? security_file_ioctl+0x83/0xb0 [ 357.276383] SyS_ioctl+0x7f/0xb0 [ 357.279767] ? do_vfs_ioctl+0xfe0/0xfe0 [ 357.283762] do_syscall_64+0x1d5/0x640 [ 357.287674] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 357.292868] RIP: 0033:0x45c927 11:07:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 357.296057] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.303777] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 357.311063] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 357.318348] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 357.325637] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 357.332920] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 357.364310] BTRFS error (device loop5): superblock checksum mismatch 11:07:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) sendmsg$alg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x4000000}, 0x4004) 11:07:52 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 357.408627] BTRFS error (device loop5): open_ctree failed 11:07:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 357.526060] FAULT_INJECTION: forcing a failure. [ 357.526060] name failslab, interval 1, probability 0, space 0, times 0 [ 357.541890] CPU: 0 PID: 12087 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 357.549815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.559178] Call Trace: [ 357.561789] dump_stack+0x1b2/0x283 [ 357.565448] should_fail.cold+0x10a/0x154 [ 357.569624] should_failslab+0xd6/0x130 [ 357.573617] kmem_cache_alloc_node_trace+0x25a/0x400 [ 357.578741] __kmalloc_node_track_caller+0x38/0x70 [ 357.583697] __kmalloc_reserve.isra.0+0x35/0xd0 [ 357.588389] __alloc_skb+0xca/0x4c0 [ 357.592033] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 357.596891] ? netlink_has_listeners+0x1ff/0x310 [ 357.601676] kobject_uevent_env+0x6d1/0xc50 [ 357.606035] lo_ioctl+0x1177/0x1c00 [ 357.609679] ? loop_clr_fd+0xac0/0xac0 [ 357.613575] blkdev_ioctl+0x91d/0x17c0 [ 357.617472] ? blkpg_ioctl+0x8d0/0x8d0 [ 357.621371] ? trace_hardirqs_on+0x10/0x10 [ 357.625627] block_ioctl+0xd9/0x120 [ 357.629269] ? blkdev_fallocate+0x3a0/0x3a0 [ 357.633601] do_vfs_ioctl+0x75a/0xfe0 [ 357.637423] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 357.643071] ? ioctl_preallocate+0x1a0/0x1a0 [ 357.647521] ? security_file_ioctl+0x76/0xb0 [ 357.651946] ? security_file_ioctl+0x83/0xb0 [ 357.656371] SyS_ioctl+0x7f/0xb0 [ 357.659756] ? do_vfs_ioctl+0xfe0/0xfe0 [ 357.663749] do_syscall_64+0x1d5/0x640 [ 357.667657] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 357.672854] RIP: 0033:0x45c927 [ 357.676045] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.683763] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 357.691039] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 357.698318] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 357.705600] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 357.712886] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000400)={0x50, 0x0, 0x8, {0x7, 0x1f, 0x10001, 0x40, 0x0, 0x9, 0x40, 0x8}}, 0x50) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000100), 0x4) sysfs$3(0x3) r4 = accept(r0, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x800, 0x8}, 0x8) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000500)='\x00', 0x1, 0xfffffffffffffffd) r7 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='\x00', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000200)={r6, r5, r7}, &(0x7f0000000540)=""/241, 0xf1, &(0x7f0000000240)={&(0x7f0000000080)={'crc32c-generic\x00'}}) keyctl$get_keyring_id(0x0, r5, 0x8001) [ 357.734271] BTRFS error (device loop5): superblock checksum mismatch 11:07:53 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 357.793247] BTRFS error (device loop5): open_ctree failed [ 357.888196] FAULT_INJECTION: forcing a failure. [ 357.888196] name failslab, interval 1, probability 0, space 0, times 0 [ 357.921523] CPU: 0 PID: 12113 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 357.929454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.938821] Call Trace: [ 357.941427] dump_stack+0x1b2/0x283 [ 357.945081] should_fail.cold+0x10a/0x154 [ 357.949254] should_failslab+0xd6/0x130 [ 357.953247] kmem_cache_alloc_node_trace+0x25a/0x400 [ 357.958373] __kmalloc_node_track_caller+0x38/0x70 [ 357.963329] __kmalloc_reserve.isra.0+0x35/0xd0 [ 357.968028] __alloc_skb+0xca/0x4c0 [ 357.971675] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 357.976532] ? netlink_has_listeners+0x1ff/0x310 [ 357.981307] kobject_uevent_env+0x6d1/0xc50 [ 357.985658] lo_ioctl+0x1177/0x1c00 [ 357.989303] ? loop_clr_fd+0xac0/0xac0 [ 357.993203] blkdev_ioctl+0x91d/0x17c0 [ 357.997105] ? blkpg_ioctl+0x8d0/0x8d0 [ 358.001008] ? trace_hardirqs_on+0x10/0x10 [ 358.005271] block_ioctl+0xd9/0x120 [ 358.008927] ? blkdev_fallocate+0x3a0/0x3a0 [ 358.013254] do_vfs_ioctl+0x75a/0xfe0 [ 358.017065] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 358.022700] ? ioctl_preallocate+0x1a0/0x1a0 [ 358.027130] ? security_file_ioctl+0x76/0xb0 [ 358.031542] ? security_file_ioctl+0x83/0xb0 11:07:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x3, 0x70, 0xf7, 0x3, 0x1, 0x7, 0x0, 0x295, 0x80000, 0xf, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc29, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x10881, 0x7, 0x80, 0x3, 0x1000, 0x80000001, 0x4a70}) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 358.035959] SyS_ioctl+0x7f/0xb0 [ 358.039339] ? do_vfs_ioctl+0xfe0/0xfe0 [ 358.043450] do_syscall_64+0x1d5/0x640 [ 358.047364] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 358.052568] RIP: 0033:0x45c927 [ 358.055846] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 358.063740] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 358.071024] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 358.078303] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 358.085705] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 358.092988] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 358.117640] BTRFS error (device loop5): superblock checksum mismatch 11:07:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in6=@private2}, 0x0, @in6=@private0}}, &(0x7f0000000100)=0xe8) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 358.175190] BTRFS error (device loop5): open_ctree failed 11:07:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:55 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 360.162174] FAULT_INJECTION: forcing a failure. [ 360.162174] name failslab, interval 1, probability 0, space 0, times 0 [ 360.173807] CPU: 1 PID: 12148 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 360.181699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.191058] Call Trace: [ 360.193638] dump_stack+0x1b2/0x283 [ 360.197267] should_fail.cold+0x10a/0x154 [ 360.201416] should_failslab+0xd6/0x130 [ 360.205379] kmem_cache_alloc_node_trace+0x25a/0x400 [ 360.210473] __kmalloc_node_track_caller+0x38/0x70 [ 360.215402] __kmalloc_reserve.isra.0+0x35/0xd0 [ 360.220068] __alloc_skb+0xca/0x4c0 [ 360.223793] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 360.228639] ? netlink_has_listeners+0x1ff/0x310 [ 360.233462] kobject_uevent_env+0x6d1/0xc50 [ 360.237797] lo_ioctl+0x1177/0x1c00 [ 360.241431] ? loop_clr_fd+0xac0/0xac0 [ 360.245318] blkdev_ioctl+0x91d/0x17c0 [ 360.249195] ? blkpg_ioctl+0x8d0/0x8d0 [ 360.253075] ? trace_hardirqs_on+0x10/0x10 [ 360.257328] block_ioctl+0xd9/0x120 [ 360.260954] ? blkdev_fallocate+0x3a0/0x3a0 [ 360.265259] do_vfs_ioctl+0x75a/0xfe0 [ 360.269057] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 360.274685] ? ioctl_preallocate+0x1a0/0x1a0 [ 360.279097] ? security_file_ioctl+0x76/0xb0 [ 360.283494] ? security_file_ioctl+0x83/0xb0 [ 360.287889] SyS_ioctl+0x7f/0xb0 [ 360.291243] ? do_vfs_ioctl+0xfe0/0xfe0 [ 360.295216] do_syscall_64+0x1d5/0x640 [ 360.299110] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 360.304291] RIP: 0033:0x45c927 11:07:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000008040)=[{&(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x4, 0x1f, "ccf3ed57eef574edf7e6393eb8fde02df176e9ea050005de6ab375f19f8a487a890d10010f902715c351c33f4e7baf7e0ebaaf8b539f5641258ed788b45145", 0x3b}, 0x60, &(0x7f0000001600)=[{&(0x7f00000002c0)="0115b5fb63db41e7cd66ed8ebf8c1bd883b1cf598909bbe212ea67b3019393e7ba4f0c8c3031cb08bd772f01944257c5613730c0ff8f48d238ceed57ab277f69decd47434dfb3d68e1d6086e6e6ae4298f5391c8830c0d01aa52a2743ab93da572617f383c0c24ccc465a2711ff0779e2e9b0aaca47e29d9e2b53c2d1e0597753871c5ba4cdbfbbb295ccdaed5b3015fdb0712506d4620cc143184fef6", 0x9d}, {&(0x7f0000000380)="3681f40115185d1f89ca13bbba9b3efd46d2011353d43e1cbced917a7ffc6decf2d7a2c4ca784e71506c6ae11f86fb2dc460087cab6e1a08868dcf130a125ee49138d10505070939b3b9106b29a9f8ad00ada8279f7db563e5067ee74e85d60cf8921f1d4545bc6a0090ebb1de6f8c9005cf84c55d9818a033325f503e085633426a816b391391620d7792", 0x8b}, {&(0x7f0000000440)="693152c3103023a60a893d4d96dddcb7c89e0ab14adea9ae6618bc37c86c4b10392433b4a18d09458fc907f9407781ab571353578f408f94d1185505c99e0d5565de69e43e4b572d20ec2c42309cdb59aea357556182526a0afca09dce4895b7b3ce0a15d4fc86582ce532d74f2af3bb47cc03b054e671b25d54805e5e3df5e576b8781822d438b3a13090449c828f10e468ee6c01827a1476432adde9e5a0981e7264cda45f59b3390e7047b8879dcba485033746a08c6957a80e41f3646ee91c6e910591eb37763338eec5bb4797c849a21bad0994cb52a1ed42af445cde8db9ae749b2417311139a9c1ee", 0xec}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="da4f926adb89047179f210256dce81a967c0c37f5a7768997eca1921f0c7aa2576ebe909d2a582ed25a0816c59f25af6769a6b1dcef2faf45a708d28ad7d25e5af769a19dca428618e2fc4a9f9ded7d78eee666bdde1f200f4dedfcb54659c01cbaa2ebf91d3bf2be0ee92a2f7c23b8df71c725a22160f688e6b09a71cf35376a6e1faea78a62453436f83635955f0ad", 0x90}], 0x5, &(0x7f0000001680)={0xb0, 0x112, 0x800, "229b8d0573edef5fbb8e117f79c2181d7dd128f50681b476f8d0e84349d8cad4c71360f498ad3cc8f9865ea676ec2b78cbfcdf4701c46f8df07c9c614f222f330b182906373b2c11bb071f01220dded4357dae4c3d62183be74d9d9c384149467b60883d8d3f3c1d8b254ad709e0468d179f3058aee7ba6dbd804317d557c0bd2d289e5f390abba7a2904468f5bbbab692448539fd67797c6b94"}, 0xb0, 0x100080d4}, {&(0x7f0000001740)={0x27, 0x0, 0x1, 0x4, 0x17, 0x6, "6efb277f6de44e11f1a438512924ffbd69464570d48d846b1570b7d62d42808081399b5b252c02489991838cbd04dd3433691b33e089659189be5e1539c69e"}, 0x60, &(0x7f0000002940)=[{&(0x7f00000017c0)="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", 0x1000}, {&(0x7f00000027c0)="75f0407c50c66c03fa339ad167d6185807121215b4d9064ea3a4b8cf80105ba0b982c4308e9c38f6af79b4172e1fddc0d2e2f9b9a9faea59a8465edd284d31c15145ec8e5b1004ccd8b502c8692b38935c79b1da4fd1cb034447", 0x5a}, {&(0x7f0000000040)}, {&(0x7f00000001c0)="cf5d11a85b835760228a", 0xa}, {&(0x7f0000002840)="8baac4ee4a45369e9fd6c59138c766d9c64087665c48771553be46701c92fe021415736f7003ac6b39dc51bc552e2b7e5000604b9fbe9bdc098113e0673ae35063b502a94c14b8345a1df4c273923c94c142e1ce62c385021c4ad93905c9f6dcb657315180d127f07449883f5261b93f67455659380198bf84fed6e054bae6e485b435ef6b800924f36d74d7b2eb61de6a81b1e981fc98552169079fc4b63a9bf0bb3aa7e6e5247bc073fbffa8ea6dece82343a8d8e310833090fd4fddc9b200def2ffdec1091ba08643a555be7d435a565ecbbfe93784a8eb68b16ec64b5ea2f80aba63791338c9d753", 0xea}], 0x5, &(0x7f00000029c0)={0x88, 0x1, 0x9, "4b86e168960548e74dfb1f8de4937949565aeeeb244641d7d82f5d7322e6251132c3c120bb158db9730acffd323a59e8077341eaa96509c3091a46bb7055650beeac229bde6318f6a7e4e4759bcc4a3dcb1724e5c498a8d4f68772168b5f30be55e19c5e3ab5d2fefc3a2afdb1d3ace8066bd47600"}, 0x88, 0x40800}, {&(0x7f0000002a80)={0x27, 0x0, 0x2, 0x2, 0x8, 0x80, "83378d8173712e836e55d933b76ce3d3c0475f5f7d4ca0daf286f2c580c6385ecb8c327e40671bb9d1bbbfc09c524c8858bd3101afc8079a7764e929686e42", 0x18}, 0x60, &(0x7f0000003080)=[{&(0x7f0000002b00)="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", 0xfd}, {&(0x7f0000002c00)="486edd9e5eadfc6ab8526f6b8a9cace8dc5c4d564e7f0217a1a8e586083ce895ba13c1b4fa6690c871257231daf7d0aa1680e08fcc4346524f5ab5897ee8046f19acfe7b0b5f1f591a6b3bcd37933c39495dad07f4dd00a473c7265de92a", 0x5e}, {&(0x7f0000002c80)="9462ba23fd947e413ad7f858da4cf2be3da9cf7d8344616b1ee685a36cf865c6668d6df9b481b6d412c0c287befb44e3543502008bdc39b6", 0x38}, {&(0x7f0000002cc0)="b08561a435d433a5dd003768a00667f8c6332c8796fcb4d8bf3953dbd75f8656d5834f2c52bcb1362f11e8d38602069c4f15ecaf2cd0fd27db5533efd9c922543a329e50d5e64d4945224d011bc07cb131d7e4d3574a6711dd20119e09e77719e2e936e0f57eaf82ef71c6c37310158e717fc66371f15c6f98e2e489eb2cc49eeff8f2861b93c931", 0x88}, {&(0x7f0000002d80)="61771ff48661fbc2da5b3ad9f913c6f2c246b18c8debabb28f6bb2d22c1724017754fe22bd24f64ced99821b40f76cf37f5c111e248dbe902f05eec2ab0d73298721f3319f8f4449ca50b3e6e165c7f3f87c771525dd9604e3ae0a601332bf4f6e86f84ef1c06184c67041932b83382d66aefcf394817cad02921e892acb2056b9f8628f9fe59c1cfdfd3593b72523789bebe6bdea13d3bf9ecd154a81a7d61f9059c5fda9003f2a28d52c3c1b618bf70f6f0248edbe649bcdc248ab77d2514a27704cedef42", 0xc6}, {&(0x7f0000002e80)="51416a64793a8269bfad7decd49e272417dba495760cd5d646fca404c12a577df55f63839fabd3e40577b75684993981d53a9cf44da61e50718a94f73f05a4db21912c0478bf5610dd21767a2c05e4258378ecf1b343b96e690e7a33fb0637acb770a57eb1a1157e2c5483cc197954955b772079", 0x74}, {&(0x7f0000002f00)="acd2cc7ca8c139a66d8c5244102b108aca30077a3adb77da04dd1167e148f58f641deea8ef1cae411b648e992d5778129fc83c81cdd9c4d19e726fbc9e8ba29148d2e9c92a27beb6f65f40267d07cbc4ca801fbf79ca8de754925ff0b6b5b9a1b9d6c2de16c45fc57ddb76e4c804eb378baf3f4aa116f8a4f08e639936cfe242cc212fc5d0abb9a87e22f84aac03ae8b003cacd59e74a37acd4884e64865b1a2227027a644200126be20cbb364cfc9e8ac35cc527a871156aa39a6959394877f5ae60c13066c71486552d26277498196f81a94dece29", 0xd6}, {&(0x7f0000003000)="c26eda7227c5c072d05ad2a85110d93c6fea89ca11c5e1c356e0285d1d32e62d2b66f395f07864888e42e3f54be0ddc586b8e6b95bd27ec1d8966a6ba1b3c0c20055846e20f17202e9248ddb359e52353fb70b7ba73ab8d616aa7c949bcf3daccd37bbb15158ef679debf9a6c326b16a208dafb40b7e22ee59", 0x79}], 0x8, &(0x7f0000003100)={0x68, 0x88, 0x3ff, "e5bdb1be4ebd135737077941567da8b21e30ebe8bcacc94373883c8a17885459be83fe300a029bbe1531228f1d6efd48f1c814c4474d58bc3b9cab2216cc5a678362cc4cba3a90a17702db3c0c6cdd4d8e092d"}, 0x68, 0x4000000}, {&(0x7f0000003180)={0x27, 0x0, 0x1, 0x3, 0x9, 0x9, "073e0badfe4a34c994a90744078321a4c151a6bb2dd354aca92f80204e46a7467835f017138000d7e79b27c0fae4ea8775afdc8c8ee99341c45c6aff469968", 0xb}, 0x60, &(0x7f00000043c0)=[{&(0x7f0000003200)="f04c6c8daa70458ee1542d5afc2e770250235f9fb9e11ac3d5ad2ba8bebe61a921e4", 0x22}, {&(0x7f0000003240)="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", 0x1000}, {&(0x7f0000006480)="487b4acb1e423ad08497f1f621de92812b94c3fa99b27c2b6ee55ea0881e269ff033228c8daf0123a3ef83603efb8b243bcd50317827be7a389ddc06f255688dd1eabef7f351d206a1b35ec4b480262a23e84b5d174e70de3d9f6ad8e3ae08a53f54bffdd54245156ee0cd539cb09e316bb5f98e754f4878032cb3035723aa0a95600aa1a6013f5af50ab8185f26547c95e8cec96a5c0b1ecd3816ef9766", 0x9e}, {&(0x7f0000004280)="2b7c19f73395b9c5439cf9e658e27c527a016ef6fa59e857fd8df52028d049f9054807f6faead53b7b5447bcfb90017b3a308e898ee1e0", 0x37}, {&(0x7f00000042c0)="0b75105a956efbbadb5fdbff54c35880f1dda030f76e98184d4f7f3d11a023cb82d8cd90082824c18085e2a76abd4e6948a17bc1fe7deb88e11b0c4c637355f282f82b83f1860cca30b1039bffd793675416e9565f36efb6392247336403af73b713accea107eceed35f06df89f5aee76d73d96dd34f804b817495a4379b098c52d378be1bd82ba0732e100474775bbfcdc2735dd6fb9a826fc92af3e053fe7891c53aa60a1663dc2345958b45581aa474cb5d554d6a01d488fdeaa877cc3bde0d651ab22d51", 0xc6}], 0x5, 0x0, 0x0, 0x20000800}, {&(0x7f0000004440)={0x27, 0x0, 0x0, 0x2, 0x81, 0x20, "b50ca935a87d6b254dacdee5dc49be6d76583d6ed914658524bdcd0e29c72fc4aa5abf314140e547eb7a9a8697ed8c6c568047c92cef5d1eca8c0269e17ad8", 0x3e}, 0x60, &(0x7f00000046c0)=[{&(0x7f00000044c0)="9435639d2c4ea044879e13fd219265649a3503c898918ecf60952ccf724fc7f5c80abdf4d95e3f7866cf83d1106088ce87b50874bd619696479d969632420dbdc72d86043bc9e9c5fcb352100395c047809fbb5d32d8364016c378a905720c46cfab0948a10a1920d4110189a467c6e482ee9b2eb303e4d8cb7946c1c4f349c6fd16f0737af15610e3388360b46270e51c4f7bc49f7a358391ce333df455bcea9e62ff78fb590925ec4eec86ec24a4298faeecbc9a65a77361fa76fcd03079da42d0", 0xc2}, {&(0x7f00000045c0)="4815bab089caa254cd0295e3f4537ed9b41f0cd2da17c2f4f44acc344f66f02673b664d7faab8b887381de7a6adee657ee3ec486d8b41b57822392b2c4d1bb5a713339966b66aeef5d4fb35296b09ecdbbd82f25688ec3c42d0775bf2fa4fe8373f069cfb4588450632d6826bf78560d26aebeb67770a69c9338555e8fdd2d363d", 0x81}, {&(0x7f0000004680)="b25ae5ff7be3887ec5aa728c1ce4f5116027a803858decca7225c728638a3adb169a0b115989f69d2ee1f9feda2d61533914b0fc5c7a73b323f6871d87", 0x3d}], 0x3, &(0x7f0000004700)={0xe8, 0x113, 0x1, "6670bffb65ecb51bd38ced0735e9a43727a76413a8458805468ffdc1182f47745e9afb6a233318cda2eaff7deaded09ac45098beab3dffa65390a144fbd72f8f3b2bf50945ff632856068061331c47114537c478cb5a8dedd601e6b536e49ee5d4d1e09398ec439ce1001e5b1329007155da3596c2da55cddf39b8c86739ea127add658f1ab1a4bbb9128dd43a9971bf0d08db3b94ec95ab8c4b90d356cfa484daffbdb4b4314f16a0d31fd6fa1af49316f89dd6529e1bd442fca90674b32d14a2486a74e87da4704d7077b73d78bde262"}, 0xe8}, {&(0x7f0000004800)={0x27, 0x0, 0x0, 0x6, 0x80, 0x3f, "539330d70a2410852a0128bc98b3e8b31eaa884eeca137b6ef2e50bad5a139a8c0629f082bd622ae4eb6885f945a7f9b53bf0900af4b010908e7da51bdffa4", 0xe}, 0x60, &(0x7f0000004c00)=[{&(0x7f0000004880)="cd6bc878547d9677b745681784ea0bf9ee2003b51d4c1a2938e6880a68f1474f6bc2d5e4b2f9fc5c29c12bcb57a2a0d5479e5dcf2be9b8853b2f22ce25c285a3d8ec2def40dc0923d4cccaaf6932a3a90a1434fb267a49cb3a6f5e0de08f6a1e8dc53ee6bdfb4867c6ac6e81", 0x6c}, {&(0x7f0000004900)="8b1f0b74017274188b2cfaa22847a0b57585d2796de7db9bd876d0ef997ecc992777fecffcba9eae7ee80a1f3ccec76a8f0f6d803092995d86d422e8227642deaa57c6cdbe314a1f029f288c36718840751279b030e105fc090aa17ea7b749da889106e9cff0cf2c5c5ce333ec1c1b3f6ef4fb2d62bd1e9ed1c2c6b02f5caf9a1928ad27bcbe09d62ed6a40cc0a58b00a516bc4abcdad276df3158ca53a3cc", 0x9f}, {&(0x7f00000049c0)="c3f2e600b7684fcd263a1249eb0d3fcb5491c3b18238cf440b7375119edaec86936a3af85b3f84626f50288c6fd1e849a538593a4e1cd152de1a224c10a0553d9d3dc6adec1a08ca285d6cf46509d239464029056c7aacf39175df6f13abb12fd3fd025f8856d6549dae543676c03e70f3dc54950b615b270efbc0845acab5e6daadae03a9b6f0a6550aa762e506843a", 0x90}, {&(0x7f0000004a80)="8cd44f523aa21dac110960dc4f1d765c6b2785f231606e79f5cc11822e32c58b72e57b6f193ffbac0c6ca3340828724e0733a318dd", 0x35}, {&(0x7f0000004ac0)="ae2cfc089d344e5344d94cd1cda954aba35993fc5057d3ee901e8a32f6200fea9847d7bce7636a80", 0x28}, {&(0x7f0000004b00)="a636bcb16799f4dd01ff3977a1fa2e65a7b73c7ddbd8cece62d12977db991e61f19db9c772c8391a5efaa1f6cb6c72e5d8d76fe295235f54624c1bede9d64b1a488412bb52329457ac3907a5dd6ec64661eaa9256ce8ae7c6ec0061591444464d14e3340e156005ff8f33dfc5d762095b2937c9bded0b762167405b8affc5be57f98806805f6d74b07dccec3083d4e919c8b4adc208209fea3a213caee8b0dcd8bbd710574d9058f11986eed03afd6a08ac199b0fe3b7c27eea28d033457b48e4c9fa0e2ae549458308da33338ff8b71a869bb68434dc2e128078295592aa20c19e9cde61bf5485474076d3009f2f25835dbece6", 0xf4}], 0x6, &(0x7f0000004c80)={0xf0, 0x116, 0x21b, "43862c77f12f82b4219bcb93f393cec3f222f0d96aef7ab06a58a7f737704835e43524b3576068baf868abc67abed5d1a5e48e07a70e5a2803b4e90a44a89f889f3f45be797d0f74d8abf3ac79f1ec91d260de323a6e6983c480afe4a578bab5fdc83822c30d31b3ec1548ad9431f7894589cd643f2a4d8400ade0aeefd9be07f2ad7caaa4e9aadf40b00a3bdf47eee8a8f575c8bf95ad1527fe565a1fe47aa56c2830235f3b40dfda77daa51698b31addfadae3d8c858d898f36f2a83931b37781f11e62e56c19f9063bcad8ae3e94df4182514d2c9236af7c84460e799b6"}, 0xf0, 0x14}, {&(0x7f0000004d80)={0x27, 0x1, 0x2, 0x7, 0xa9, 0x4, "bfc35839533ef92062483f948146020cd3ca6fff8e940e0400edff728b4b1015bde55e7d493e2226f8662e1794d3733c00", 0x12}, 0x60, &(0x7f0000006140)=[{&(0x7f0000004e00)="9ce752b0ad9df96c55bc3339a7e025beae158b5db43790d69707849536a98e8534a99e32ebbffc0ec3e7c33acc434f6d20c586c749a19d160dd00cf00497c816fb25846459aa3bda89cd75", 0x4b}, {&(0x7f0000004e80)="f396c49dbb0a8ea01155d7ad91204256701ebc3e7764cbf3fc34fa39dbcc0654360e1305dd1710b61648d774fda35c794f8cbea12d23635252ebf0711caf98e7723517d5fd72e39285fdf69cbb1adbcda3bda6d16b502475684e4f900e64fd53e752947ecb062b88f7d47453c18dc7c41584a81c5a7f77a171accdab6e87c395813f1ff2ee6bc83b0ebcc16fbd16f5ad4729149865f9e2a30153dab695c361c5c1002e992e73354e4cf05727c56ec8ee949f8278d2911a0c349faf794dfd150216c0df907b2173a0c0e945bfabaeea1238cdb6e585d492996cb58aee67ed4f2f113a4caf67730391a38a166bf61e62d0f83977646e264fe9e1e2d4864e1c64dd43bcc3751770f62c0b190cc33bde7c61d2a37a6a1575bf8b694a779bbbc2d32e6cb8cb50706eee107dc9993a642851060116bd03de9b1e026492f37b5da8829c2959c89ee91c0b0b47c7b4af07c9c4bfe5c99036b9781750bbb52055d7fbfab5457e63bd691f6b016f42312859663d9646577c1712e63ea4a809bba2aa822c5727d13233ff44cd6bba97c1a07492f2bb5ec59f068ca5cf4328acd43a36c0cb27464a09a84bd4ed57ed034fa644fba704829f42732c066cce4778c34260854ff5e122ad634f9154724687dda999af4655969707e19d4eece29f4e7d5432c39be984c418c6fb42baf02bced646e2fba55e6b5232e3f7cf9d80dae1ac1a635c4c7964cbacb49f37d4c22168ff4fe72e975929e0a31525c40eef9860d640fde2bfa22081b806c7caad4f620051fb30f16c62b4a0626a825b2eea1e40b15c74306ca07421dc44ca273dbb197263006c62404ab3257f4c0343c647e5d19529a7a41cb856aa664b40471829a59263b2751a516bd401bcda21341267366a7b0cf45fba74a45a5c592f229d54ed7f7db94507fc7be3e5735f5662961f57aa09de500c7965f0759a9d79703754411f488f55128d6fe4ed1c74f9704a55a53c935d0b424f8f56171e0d79588e64a3bbcb84cf2749647a8a3e07e3c632c61f14334b315d45c794b58af64c658afa9e61be3a6b2871e212985d7ec0dee6bc4406846c0a44c0665f9aec60562c1ee971320971892c4be119e7437f45ba440961d1e24d4cfc30ad1a08711f379865ced8de2081eee8f5f76fd6673edb5a631a05edeeb9e87f217d9c004fcade86ecd17434aca77bd70064daeb864b6a1a111e9eedf8b11cd1408306769a96bdf96fd161f295d0082406ef5bd0147cc100d381731c2d1e754948be24a0522c4910459031cfa4e0354566bc8a625d3af54d2502e7e0fbdb61c8a326d5ab845d7b626ddde70b5910a715cc5f2e80ac531591c0f20a6274208a4fc8d2ed47aa85936472b997d765ecc449d896e6d32f30f4b8fc376d5f5e7607fc7f7136acbd3d4bb032ed5ee1b4a8de2318a38c34bc179b1ca8b3a6739bf5fb374fb82d1c41a852ae35d4bf94adc968b1494305a10d1867c3fb656134746af7d9212c03c64b93109a2c8b913e7a7cfc9251c74521e90e6e247b051d5633524589d279bc889d6280954b8fe8db33d1b48dde8ccfcee4479a7b07c7b3214f0f04c751652f87a026833fdc32879e3cdfe0b32a6964aa8cc05bcbe80832373292b3c7c6267014d7dc476f503581c5185d10e1abfc5e870bd58877fa63d0e22c1910a1e6dade67a7286232093e744ae0673da112564b55f887a042a953ae7c3501b5c4cd230995cced9a2dba66856e14ea3adcbb9cd4aa21ccbaa6cca82313e4594c7fbd7df0432d5e53910ce9b7eb18a47d03776356aa0c13a0e2d0899767bf05b55889091927d13587d271e9d2ef02f10788a634a649913a199c04db1053f2b80cb841a05a23ae8770f6289e212db94492413e9cb742cd2e5a43614c9fc58aabd9415ae67ccf173673f91e1a66db919e7bb76be51219065e4067518f956d483e1675f43d27bc2f3b73b86478f9bc92d93b4fa96a4d7306e5e0c7493e0369eb89dc11614571d5cac359c09ac1e752b9207ba8bf36fdd752b236ab895522707e01dd315e47fdae51e95b75496f987d8aa7f11105c0c564b211437451a82c6dfcfd387d2519cde6ebb58110130b46434c3d25bbb328f31e128eed6daf2e82b38d8933829adf3d27d76adc0036fe77c8f3199eb23b48df4e7e22ac7893f4c9b2c67a6c21294d0edb0788750ebfb895f077671a82b7b78ac67ae6c647c57c4c470f8d40cf5b947b51cf259e8b569bb2753fb602e44e28738a54a2406d2d96fd80a4c14011b27449748019df8c30bf2d536d69cff2e5e61a39e6b2531cacc58d02d08cd6cb6f980153c2590c763b10234336b1f05fb9fade35d596ff6f1ec6ad6e268ab25d7cac30980617800c52da7d7ee6e71c2ed8a6665be339e8d4c5b8181ba4ffa94d217cbf9a3ad347813a72315642338ebbbe2e16e2f5eb65633dfc90e88c8f6f42773547658a355120a6d946694ddcb163e78ac459a647806a19454378d60005ece2243dcafa5afd3ea331f39a119d6adf7ff96648fc5fe2d76307e1a4e204ba858c1aaf8677e155b5b7083eaa1a041c7f7875a20662a8ca1f626e34caf22d2be7a5c14d56b3151480ad4beb6032496afc6c2f3e9d1d8acb6b337aaf96cf8c35bf623f6ba0e8a7344d56e481162521c5b874091f558720fbaf16c826ed5822c158fbff0dec6e6d85c5067fb48ff3d8157cff15e2928ddbf610514c6315fb43693100141e8dbd458d270d40f466b3b8ccf0f933effec6605ae159f1a00729bf29761455767d92573206ee2c94aaba20b615333396c6f97b3b9911d0e07a9458a883f9e6ea461d69a4cadb37b923c1c8df18adc4a84e4b6bfd9a5eaa4331f329ed12a8595f8f1dff071b2c0097fc9952a8c523dffc907d31058793c6a1719beecfc8267da7b83258d52b46fc846b4bd316c046527f6198ba55a75ee4753aa852824299455c8ebce4b8de2aa8b2810818e8de1098df60e5a183c3ae30fe78ea65cc04dca9571508fa8a0269ab42a3af6e3e7107428de9c39420c841209648919243ef0583e426defd2fbb67abb99e5473a5791086c588d335b54a4152c6c31c34a770117b66b1b72c664dac04c2a3ccfd27b759739e7230fdb3babd0bc19827f3ca7e6542a87018a5ed8ba186450d70f9b20e5c2e8e5c2fe573dfcc7b2f653690eb25ae3486582005f276aa3513172b84b8627dd81bbfdd1cd8c39088a5e0ae73265cc5dd5caf65cc785075db2929190f57c5b80eb443c805d4cdd4441c3cfb43a0c941e37a3663c4b340fac41ce3a52aaa8df73d5f9da498bb1228d7e411fbba158df58db80a97e9dbfc80a44ec21659b669cc5e9f02d53d4ed1246d2189810e05cb034d63dabae3df27f4a2cb0f1654444cfe43f25375ead1ee094a5025a76af3ca8bb7c905ca194ad8d07fcbb04dae12bb64a88a47cea81c912a9c76abcb7f5a4a3a5edc799ee7b563952db2f80d863113a04f18843c83979ac75b9a912f01bd89f7c414861a644b0a9e3f22e6b9ecab3e888598309014550353c7739e303251ae0d6a1bfccab4ab795e810b233d4c0deb3b91c71434161543c30e4b0f5a94b5b8769b65d9056a43e60484ef58997a641f8fb4dc2310c0aed14215e353e942856c1a2e8c479afa0cc2fa68eed65db159d3fdd8a973b29e5ec411da3eb13c4eada473e1837c0648629749e1fba5dadad2c2519edc0375948339a6c3d641ec036b5fc22bedbc02dd587ad2bc6abadc2ad329abffdde10bc06b73ed961467fee51d6bc9a6fb25ac4b1518ea8eb69bf8be2a391c0b1861c020c0a8bc45ba7303cff0ab01c036462b87874739dd1e7ec3b35e6ae319bec21b22ab649394a59c5ed98b0dbdf765207ec68501460aff4aff6e73c5cb84aed81b3b2d8c2b3588b479fcdbb1c16dac762dc0cfbcaf0c65c812d5ab6134d3f3ee3280ffeccb25452858e4bc1e66a1437e409a64c24785b1170d814c0f2c140d96d7b82401f2c51c174c63f9ca623824f4c9fd4b4f588822544c9b51e29ba88bbc2c0dd9d93e29cd256649d707088330c979a41508fa24f26a35f4b02b7c8fa16199df0cf320efc2a919003698a0ae4d41d0ede4f815d0ecf05043c9246e776eb6c2d6aa2cbfeef865fe7cf3150c263541a6be006538097ab991a97214a929439fbd685e3ef0cf9fb2560e4b20c7d515af4b9b1c414d0b08d1ccba39bc0aa0c30c837959abb55b66a08cc97f61b847f379a5fa49a0075ea4bbf1a3258a50af4bdb0a50b48e4b962fa6b5f338fe7c948a79f16613fd0cf6e6d5628bb840594cb47b1f4a51fa5925b830476c1fe5bf114c92d5e8e3951a7e1e52af89f75c6e7e257f02d7352c1de216e119ca0b43d4409b28fb22c2c34114acd603f8a2824ffa68b5081f019f16cb2752869d495e4db6a55671d887385a494d0a7173341298cf9764e08fe8d81645344cfeebac27c6e268a6cbdcc510770f485c247d1fc64c7dd25e027ebe260ef823d533d6b0e453fabe09b0ce99a494adc455175750f0edb69ae7e00483114077bbb6073f4ee6f62ca54ae81f00a720ec74798c29d19dbea3d98a44cfd4c305244cf4d53819fce8f85dc6e9dcf42c671f1542ca60f22a609628ff39106e36361bc5a3a00f0fef304bd5f72720699f1d02312864e02d550994f64a99b20ed042c66aeaa55237b9019092e002a6918bd777a47be4a6d703ff7ed367b4814c772abf1b7d2c3a96b453d39ea44587d87b361c2c16508c8fd7c88218b66328aeedf9cac825d3dfa964effb719575d8dcb1ab7c94392831fe7d3141a4d7d770c5525e9f71a5ee2e919bb3db4ed8ff45512f5dc85d42ce4bfbd83bd478405ff0deb8d6942694c01e4881fe71729c5c4dcd16ae304d6f7184b84b8cdfb6eb178aa7d7ce62d32b9fef5e58741e80138cf50c7d3632e1f0aab86bca76978e3e29f4122097e2968d79c3c1724c0ce5a97828c8ea93f1149d389e5d877457ae1f9d9308b31a608513bfbe76fe5096d7cebd3a76a640b1d4574d1323b81873eb925f855e5a6ebdb48836b000f42b1f4441e5b5f35cdb4b9736a4de0f4259c49c155a5b5146e63e18314563078f4af3f77962fd2153d5ce7a0c2052c4e7649eafa9f5f916241166c3e10a898b0b6c52fc0a1c7625bae4e0a02bb18c2003b0a47690e0c7d235d663acdba54817be8e7dd37ac0ba06dfd17cf2202fe68aff19d95a50af35716e1274aa760cda8ecf19d7fc746222b420cc826b2a8c62a0977c67267abb5eede4e2d583d30cbae20601323627c39ec302201c6c459ed301f7270c8361a274ce22c36b7fe0dc57df31addf3e591bef048a2fdf3fba0b998a0eef1e6be728374fd6e3b6c74773e882b18132605fee36389d61dfb69d6a0faf64b4ea7eb7d2414bb71efb67dc979bfa1ae5bebdd3b25f2c7f46e23641b1084ebf9804aa8911ba78f980283f6c6fbedbf73ab68a85f24e87b966fc81e291378e682672f23189d034586f9b721b1c3041f5323996d6c95e983327438e28c137df95a0639c95bd2b4768814ecb457de8452193438479367153aaad7bdf91817c4b173c62e588fb0c31309eecf91e5bc69bded3b87ea0d888b0a78b3f8bfa039cb15752328e5f9c1010aeea95a83f0a36c68f93edfc9c53970f9860760eac050b381447a50a0d9888f121a192c25b73306eb5d375e482a6f3a42bea21ad4d2cd7301b06261f9e4afaa7da1f5674ffd9531b887f61bac735f64efe06302539cc2c330f90381e78ea950d0700350b558cc967238234fd0aaddebf82ea00ec1294026671b273fce6c7c580c461dc70b004737a9acc7e", 0x1000}, {&(0x7f0000005e80)="d9a40beb95c5770bcd454f4fe9d62719fa02a219ec1040a10835defefd41b06b0077740943f3bf2f3fe859681eccf65b28b907f0dbccc5d9c22c0ab4e5a5824ab18823b318856f248d2a9fe53059ded488b83ae8c5ac24f4890c950a34db47851d6007fe19f91a7020adff7d8361739aeeadc20e4f2195838fa81eaa4e3cabd6c2cbf58e8ac159cb2a397734097edc6426cce6fc0d52b4f41dc9c7921b20cac89e67c39e93b2f141fe30888f2ec694b817", 0xb1}, {&(0x7f0000005f40)="9498ba27bba749f2029a81c1fe1a745d8a81016179eb97efa5dc762522da31d48a0431f4ae323442c760e216ae972e236c7aa9288dc18f300596a07f7b0182ed69e0c96974341450f0cd18d6cc50b0a4a0977c4a8f816ab93766d55901af87c1b2dd39608d7fc781b049c45e52986382cf897b50506ceac97db513f1b7b89670711f8b5b295ace1725f17e5688a7ffe9271d7dce2782c50e5f6eb63cc3aa084b", 0xa0}, {&(0x7f0000006000)="2dff85655670b54b2d5c421f3769a83e5c83f13208fd656518ba75cfa37134154ab215e03813592bd23322d4069d78e2cd6224498147e4fad71e2a4c4359d03e42104bcdbab882b54eb8d07a61dc9ed4313f34052977a31bd7facf06af98b20db7dddd03400dce9e1c68bfeef52b8f9b56d912fa7c81623692d1ac050a05ca8b3728097e85ec42300d35bb3ba7e3360a3c2cc37ada4dd4f86b08d039c0e5c8eeda9743940515883c9323a7eca39bb70ca09a8f3a3a6f8f17127ea76f06189f70d0651800cc73ff9ccba8ffb6b8e7eca965939d10ffa028335a6c5998988d241545b874ee1fc78863f2b13aa2965c83b48ec29a0c41", 0xf5}, {&(0x7f0000006100)}], 0x6, &(0x7f00000061c0)={0xd0, 0x108, 0x1, "81208fe1cf959e116a90c3734ed44e2c98cf462fff5b0b47aa49469262f0304aaed165902f7f1397306355330b7dfe040ab5548b3a13afd26251a5f96cd92e26c92fab5f41de65c9c9f4cc6db031fd1396573d07f2b93f0d01935d3ed53f3905bf29393802ce1fa9b2232d65dc5a86a281688dca2bcd3d16c1122afff7bc48b92c39f85dc63b90cb5f95b5719f3d8803c9a656da1bb849fa972b2706f45595fa179c97d3cb6ecd73d70aec0a1fd2c2cba94054f6da48813b55dfc7"}, 0xd0, 0x49}, {&(0x7f0000006540)={0x27, 0x1, 0x0, 0x5, 0x20, 0xff, "b777c7550c1b13a32cab58ee47b22c5b63ce0111e5e69a4cb97df2fb2a86e0d7c2c383c787b7fd105b8c263f612d048d094ae4a788c9737fee85475c8321f4", 0x3e}, 0x60, &(0x7f0000004240)=[{&(0x7f00000065c0)="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", 0x1000}, {&(0x7f00000075c0)="c344f8b49b40bcca6b1d526f008c6cfd083c5c775b1fff897ff074fb651de0e59e5e88c8c285863ac83947df64106f71994b825b19c5486c895aff57df02d6ab69dfe61acc4cec167dcd99d9d62b17411d117f6dcbbb2abedb0cc0a5a2ba273ec2b2058d0475935029ace65b5db26ad2653e077b08827cd770ee3b", 0x7b}, {&(0x7f0000007640)="651e8b2137057c4b2da4e15f9436d309f1ef95a03c4162fb6f0b765d0d207794dbffec5cf12eac3bb2a52cd902a0ee8f031e5afe98770aca0b024cbfb006dc7bf26e056137", 0x45}, {&(0x7f00000076c0)="cec4fc551e68f2c3b39c2e7a4d2de9a6e6da05546d888fa9c40d4964fb8a61b41662a74d590aac245d56a6816cf0f690811cad6510e946420384dbb582ba29c94fd01b357add3783a8b34916e2c6129544d9f5cf0bc4698392ff4e6b3cd5ac4699ac55f6e005ad8c626ed6dda70b7058b955352c79a756bb486002760ce9635ef9c4781cfa7dd898f2caa330e2ad3bbe40eaae716be37f980773c557da42c609b882174609878abe59ba2b", 0xab}], 0x4, &(0x7f0000007780)={0xd0, 0x102, 0x6, "7be599bd4f344975d5bda45cbf69c8ab1c59671eda6bc70fd0d29bfb7692de3b9a637f669455c4b18ff20539ccd33c6801cd6b156911f82ed103d6bb566691ec297adc3924fed9a8c54f50ea80f3325edb4baa61fa1768c1e2b4e0a681ee0c517ff0ab45cefaf1f90bf3a01d0e7abec3cf348c150b2870429ffaf74bd404dbd86ec14970d4d7ebd4ad8134e39c84c5892ee41a262bba499216db2e22ffec19a26dde177d3fc4008157528a5098bac684a69b93b87377ba2c0eb97782"}, 0xd0, 0x805}, {&(0x7f0000007880)={0x27, 0x1, 0x0, 0x3, 0x7f, 0xff, "9510b022cf3661c69337738c416fa46aa3f719b3d1bc15be12f71d168656fe2bed7fe540ab4e0fbe4146fe5c1649cb82c7c24704f43813fbe64f68944f6909", 0x14}, 0x60, &(0x7f0000007f40)=[{&(0x7f0000007900)="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", 0xfa}, {&(0x7f0000007a00)="95c1d377cf0211c6a1d86b28c82b375d66131b81fd35504a6b9918ab2eee9da6f2d374906e3e29f0b92f4f8b15db18c8f97ea9ee652ad12b17b137600f64858a820cd318f35c7ac2d51aa246c0ecdf6e4f36d26797f4200ae48afb0067a6aecb017d37e0611ce5b8c74046e3f4a705309a4fe6c7003c8d26fee493c63d5ca9418159724db95ece014fdb8bbc66b99b074f66597ce319a4d5caef20254078693bbc35c8b6007798464725561a472fbcbfd1f8f36ec5a77964647b7641d70ec8700d506fd4a1366308139c90f2e34e66bd221636da4af28a95a457f2a624893672f5068b06316d", 0xe6}, {&(0x7f0000007b00)="fb616bc814c3d8ab9b56ea0496864c027bc4151b28e157c3dcf4f922d2f6735b07d7a7a0297f00ee96a33fe7bb972176c3a7a28a8ebe6fd0f3558b2667d947631e6bd5c0ec0195c4085acb8e9a2ba8d6f9da9e9ad31c5fc75595f2b9e8f193721ca670740b4ad5f2165c3d214638fa54bc1cc4c59c3bad8049a9485e2734b0290080116e2ac8db4ea32ffa24b719c5d308df4c3e1944c46fbf09f43e", 0x9c}, {&(0x7f0000007bc0)="f297e5277a2ce43f82bc113464fcce544ed1ebe8a8cfd005067a964ccf81e7c5bed128f5d135be900c0aa9bb21dc05b48f507137d126e08bb2669b54af404464e0c3f8f03639eaa0f34eb84eb2f740709ade093f994a80be9ce036804b93a76e8d5956cb", 0x64}, {&(0x7f0000007c40)="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", 0xfb}, {&(0x7f0000007d40)="3552d025f65c1999ef68715dad7e96447ea4b7cc00872f0c76768a1bd9e7b5136312d4183ac29c77fab238537e3c98cac9ce20824a537df4e11c7df0d03f4d1d20901c14b2dda7e0b97e4cd38f09e0ac54f8f6ad2829b6b02d31de4f7e90a6c2ac67ace61046cace6422299662dd3f112dfa19b3b6b95157cbeb90645e436f00e6c8e0763a0674e7d754849e7a626f72ae6cc9951527f10e57f6d5beb5176b9b01a195c30a8fc23764f67ecccec12ec844b6a993d90b675710a46269bc9b6b00d6d6a87da892f64ccad913608bb4dd481034be6ae5214054759fb6ccd0ca40ba645b4f623d3d0fc2f1cc68d4d521727f229bc63ae48d6c60c6", 0xf9}, {&(0x7f0000007e40)="2e9c0461311efc270a9b006e7bd54761370e433fc93a594abb432b9b81b5274386a250cc020fb0c275bca90b112b05db8d11b8dcf3eec53bb38e71ddbb5e92fb4b6e73d1b469c26e3a9805743452b65bfa10d9989edf2cfd4a33283b87280ba6295b1e48a7eb30c7dcbd07e5f424b5aabe6137f9c4ccae00bddfc718a23c2a24571ede9d2460d5988f743865c11f2addce2dfe42fae445e3d329355e8f53f0e75a9c80f5745509ed1a59ae1f4faa13fa9c6401fa9c4b5af18a426c985e809447efb70cd21e1b7869c25ee0df8c6d2aff38930234f2b66d6e0a", 0xd9}], 0x7, &(0x7f0000007fc0)={0x58, 0x107, 0x3, "b3f55a358b9fefc615e9f8777fca4c8b1f0b1396da765d6bc4c18a68ca49c96160dedee853ac7d5014b784d123280518976b52fc102ddf2d1f453878e3e4ca7de9"}, 0x58, 0x20020003}], 0x9, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYRES64, @ANYRESHEX, @ANYBLOB="00012dbd7000fcdbdf254c00000014002d80070000000905e900060000001e0a00000a0006008906b412ba34d916"], 0x34}, 0x1, 0x0, 0x0, 0x20044880}, 0x14) syz_open_dev$cec(&(0x7f0000006100)='/dev/cec#\x00', 0x1, 0x2) syz_init_net_socket$ax25(0x3, 0x3, 0xf0) [ 360.307465] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 360.315171] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 360.322445] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 360.329716] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 360.336982] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 360.344249] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 360.378701] BTRFS error (device loop5): superblock checksum mismatch 11:07:55 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 360.428984] BTRFS error (device loop5): open_ctree failed 11:07:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000007f, 0x9d9b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 360.541247] FAULT_INJECTION: forcing a failure. [ 360.541247] name failslab, interval 1, probability 0, space 0, times 0 [ 360.555130] CPU: 0 PID: 12176 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 360.563055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.572417] Call Trace: [ 360.575025] dump_stack+0x1b2/0x283 [ 360.578678] should_fail.cold+0x10a/0x154 [ 360.582848] should_failslab+0xd6/0x130 [ 360.586842] kmem_cache_alloc_node+0x25f/0x400 [ 360.591437] __alloc_skb+0x9a/0x4c0 [ 360.595069] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 360.599918] ? netlink_has_listeners+0x1ff/0x310 [ 360.604685] kobject_uevent_env+0x6d1/0xc50 [ 360.609020] lo_ioctl+0x1177/0x1c00 [ 360.612656] ? loop_clr_fd+0xac0/0xac0 [ 360.616552] blkdev_ioctl+0x91d/0x17c0 [ 360.620445] ? blkpg_ioctl+0x8d0/0x8d0 [ 360.624339] ? trace_hardirqs_on+0x10/0x10 [ 360.628588] block_ioctl+0xd9/0x120 [ 360.632222] ? blkdev_fallocate+0x3a0/0x3a0 [ 360.636582] do_vfs_ioctl+0x75a/0xfe0 [ 360.640398] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 360.646038] ? ioctl_preallocate+0x1a0/0x1a0 [ 360.650474] ? security_file_ioctl+0x76/0xb0 [ 360.654898] ? security_file_ioctl+0x83/0xb0 [ 360.659323] SyS_ioctl+0x7f/0xb0 [ 360.662693] ? do_vfs_ioctl+0xfe0/0xfe0 [ 360.666668] do_syscall_64+0x1d5/0x640 [ 360.670541] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 360.675818] RIP: 0033:0x45c927 [ 360.678990] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 360.686691] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 360.693949] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 360.701201] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 360.708594] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 360.715911] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) socketpair(0x33, 0x0, 0x5, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080)=0xfff, 0x4) [ 360.752464] BTRFS error (device loop5): superblock checksum mismatch [ 360.805465] BTRFS error (device loop5): open_ctree failed 11:07:56 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 360.928155] FAULT_INJECTION: forcing a failure. [ 360.928155] name failslab, interval 1, probability 0, space 0, times 0 [ 360.941304] print_req_error: 42 callbacks suppressed [ 360.941311] print_req_error: I/O error, dev loop5, sector 0 [ 360.948588] CPU: 1 PID: 12202 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 360.952495] print_req_error: I/O error, dev loop5, sector 0 [ 360.960120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.960124] Call Trace: [ 360.960147] dump_stack+0x1b2/0x283 [ 360.960165] should_fail.cold+0x10a/0x154 [ 360.960181] should_failslab+0xd6/0x130 [ 360.960191] kmem_cache_alloc_node+0x25f/0x400 [ 360.960206] __alloc_skb+0x9a/0x4c0 [ 360.960217] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 360.960231] ? netlink_has_listeners+0x1ff/0x310 [ 360.960242] kobject_uevent_env+0x6d1/0xc50 [ 360.960262] lo_ioctl+0x1177/0x1c00 [ 360.960275] ? loop_clr_fd+0xac0/0xac0 [ 360.960285] blkdev_ioctl+0x91d/0x17c0 [ 360.960293] ? blkpg_ioctl+0x8d0/0x8d0 [ 360.960302] ? trace_hardirqs_on+0x10/0x10 [ 360.960325] block_ioctl+0xd9/0x120 [ 360.960335] ? blkdev_fallocate+0x3a0/0x3a0 [ 360.960346] do_vfs_ioctl+0x75a/0xfe0 [ 360.960358] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 360.960369] ? ioctl_preallocate+0x1a0/0x1a0 [ 360.960390] ? security_file_ioctl+0x76/0xb0 [ 360.960400] ? security_file_ioctl+0x83/0xb0 [ 360.960413] SyS_ioctl+0x7f/0xb0 [ 360.960421] ? do_vfs_ioctl+0xfe0/0xfe0 [ 360.960436] do_syscall_64+0x1d5/0x640 [ 360.960452] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 360.960461] RIP: 0033:0x45c927 [ 360.960466] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 360.960477] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 360.960483] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 360.960489] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 360.960494] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 360.960500] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 361.126703] buffer_io_error: 39 callbacks suppressed [ 361.126711] Buffer I/O error on dev loop5, logical block 0, async page read [ 361.147937] BTRFS error (device loop5): superblock checksum mismatch 11:07:56 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 361.195406] BTRFS error (device loop5): open_ctree failed [ 361.270825] FAULT_INJECTION: forcing a failure. [ 361.270825] name failslab, interval 1, probability 0, space 0, times 0 [ 361.279212] print_req_error: I/O error, dev loop5, sector 0 [ 361.282808] CPU: 1 PID: 12214 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 361.291994] print_req_error: I/O error, dev loop5, sector 0 [ 361.295687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.295693] Call Trace: [ 361.295715] dump_stack+0x1b2/0x283 [ 361.295734] should_fail.cold+0x10a/0x154 [ 361.295750] should_failslab+0xd6/0x130 [ 361.295761] kmem_cache_alloc_node_trace+0x25a/0x400 [ 361.295774] __kmalloc_node_track_caller+0x38/0x70 [ 361.295788] __kmalloc_reserve.isra.0+0x35/0xd0 [ 361.295800] __alloc_skb+0xca/0x4c0 [ 361.295810] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 361.295822] ? netlink_has_listeners+0x1ff/0x310 [ 361.295832] kobject_uevent_env+0x6d1/0xc50 [ 361.295848] lo_ioctl+0x1177/0x1c00 [ 361.301547] Buffer I/O error on dev loop5, logical block 0, async page read [ 361.310891] ? loop_clr_fd+0xac0/0xac0 [ 361.310903] blkdev_ioctl+0x91d/0x17c0 [ 361.310910] ? blkpg_ioctl+0x8d0/0x8d0 [ 361.310920] ? trace_hardirqs_on+0x10/0x10 [ 361.310938] block_ioctl+0xd9/0x120 [ 361.310947] ? blkdev_fallocate+0x3a0/0x3a0 [ 361.310956] do_vfs_ioctl+0x75a/0xfe0 [ 361.310969] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 361.310979] ? ioctl_preallocate+0x1a0/0x1a0 [ 361.310998] ? security_file_ioctl+0x76/0xb0 [ 361.311009] ? security_file_ioctl+0x83/0xb0 [ 361.317711] print_req_error: I/O error, dev loop5, sector 0 [ 361.321337] SyS_ioctl+0x7f/0xb0 [ 361.321347] ? do_vfs_ioctl+0xfe0/0xfe0 [ 361.321361] do_syscall_64+0x1d5/0x640 [ 361.321378] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 361.321387] RIP: 0033:0x45c927 [ 361.321394] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 [ 361.325434] Buffer I/O error on dev loop5, logical block 0, async page read [ 361.330444] ORIG_RAX: 0000000000000010 [ 361.330452] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045c927 [ 361.339045] print_req_error: I/O error, dev loop5, sector 0 [ 361.340016] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 361.340022] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 361.340027] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 361.340033] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 361.500956] Buffer I/O error on dev loop5, logical block 0, async page read [ 361.513925] BTRFS error (device loop5): superblock checksum mismatch [ 361.566520] BTRFS error (device loop5): open_ctree failed 11:07:57 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 361.670406] FAULT_INJECTION: forcing a failure. [ 361.670406] name failslab, interval 1, probability 0, space 0, times 0 [ 361.682530] CPU: 1 PID: 12231 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 361.690430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.699797] Call Trace: [ 361.702395] dump_stack+0x1b2/0x283 [ 361.706041] should_fail.cold+0x10a/0x154 [ 361.710210] should_failslab+0xd6/0x130 [ 361.714204] kmem_cache_alloc+0x28e/0x3c0 [ 361.718368] getname_flags+0xc8/0x550 [ 361.722190] SyS_mkdirat+0x83/0x220 [ 361.725833] ? SyS_mknod+0x30/0x30 [ 361.729387] ? fput+0xb/0x140 [ 361.732505] ? do_syscall_64+0x4c/0x640 [ 361.736494] ? SyS_mkdirat+0x220/0x220 [ 361.740397] do_syscall_64+0x1d5/0x640 [ 361.744316] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 361.749510] RIP: 0033:0x45bed7 [ 361.752701] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 361.760428] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 361.767717] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 361.775004] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 361.782280] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 361.789566] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:58 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:07:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 363.451887] FAULT_INJECTION: forcing a failure. [ 363.451887] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 363.463732] CPU: 1 PID: 12251 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 363.471618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.480979] Call Trace: [ 363.483575] dump_stack+0x1b2/0x283 [ 363.487224] should_fail.cold+0x10a/0x154 [ 363.491372] __alloc_pages_nodemask+0x22b/0x2730 [ 363.496131] ? __mutex_unlock_slowpath+0x75/0x780 [ 363.500984] ? __lock_acquire+0x655/0x42a0 [ 363.505229] ? set_blocksize+0x24b/0x2e0 [ 363.509293] ? lo_ioctl+0x8b5/0x1c00 [ 363.513006] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 363.517851] ? trace_hardirqs_on+0x10/0x10 [ 363.522087] ? blkpg_ioctl+0x8d0/0x8d0 [ 363.525974] ? trace_hardirqs_on+0x10/0x10 [ 363.530216] cache_grow_begin+0x91/0x410 [ 363.534276] cache_alloc_refill+0x28c/0x360 [ 363.538617] kmem_cache_alloc+0x333/0x3c0 [ 363.541009] ptrace attach of "/root/syz-executor.1"[12258] was attempted by "/root/syz-executor.1"[12259] [ 363.542772] getname_flags+0xc8/0x550 [ 363.542785] SyS_mkdirat+0x83/0x220 [ 363.559902] ? SyS_mknod+0x30/0x30 [ 363.563445] ? fput+0xb/0x140 [ 363.566559] ? do_syscall_64+0x4c/0x640 [ 363.570550] ? SyS_mkdirat+0x220/0x220 [ 363.574451] do_syscall_64+0x1d5/0x640 [ 363.578352] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 363.583556] RIP: 0033:0x45bed7 [ 363.586754] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 363.594474] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 11:07:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 363.601755] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 363.609040] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 363.616325] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 363.623607] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 363.691634] BTRFS error (device loop5): superblock checksum mismatch 11:07:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:07:59 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 363.754795] BTRFS error (device loop5): open_ctree failed [ 363.834345] FAULT_INJECTION: forcing a failure. [ 363.834345] name failslab, interval 1, probability 0, space 0, times 0 [ 363.850099] CPU: 0 PID: 12282 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 363.858321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.867678] Call Trace: [ 363.870280] dump_stack+0x1b2/0x283 [ 363.873926] should_fail.cold+0x10a/0x154 [ 363.878099] should_failslab+0xd6/0x130 [ 363.882095] kmem_cache_alloc+0x28e/0x3c0 [ 363.886263] selinux_inode_alloc_security+0xb1/0x2a0 [ 363.891369] security_inode_alloc+0x8f/0xd0 [ 363.895786] inode_init_always+0x576/0xb10 [ 363.900006] alloc_inode+0x7a/0x170 [ 363.903629] new_inode_pseudo+0x14/0xe0 [ 363.907601] new_inode+0x1b/0x40 [ 363.911024] __ext4_new_inode+0x356/0x4e80 [ 363.915325] ? ext4_free_inode+0x14a0/0x14a0 [ 363.919734] ? avc_has_perm+0x1a4/0x320 [ 363.923777] ? __dquot_initialize+0x3f4/0x980 [ 363.928265] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 363.932932] ? inode_get_rsv_space.part.0+0x100/0x100 [ 363.938116] ? security_transition_sid+0xcb/0x120 [ 363.942958] ? security_transition_sid+0x9d/0x120 [ 363.947863] ext4_mkdir+0x2e4/0xb60 [ 363.951490] ? selinux_dentry_init_security+0x220/0x220 [ 363.956868] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 363.961541] ? security_inode_mkdir+0xcc/0x100 [ 363.966129] vfs_mkdir+0x3af/0x620 [ 363.969672] SyS_mkdirat+0x1b5/0x220 [ 363.973375] ? SyS_mknod+0x30/0x30 [ 363.976907] ? do_syscall_64+0x4c/0x640 [ 363.980872] ? SyS_mkdirat+0x220/0x220 [ 363.984751] do_syscall_64+0x1d5/0x640 [ 363.988744] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 363.993926] RIP: 0033:0x45bed7 [ 363.997098] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 364.004787] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 364.012042] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 364.019376] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 364.026627] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 364.033880] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:07:59 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 364.124234] FAULT_INJECTION: forcing a failure. [ 364.124234] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 364.136282] CPU: 0 PID: 12292 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 364.144172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.153532] Call Trace: [ 364.156143] dump_stack+0x1b2/0x283 [ 364.159798] should_fail.cold+0x10a/0x154 [ 364.163967] __alloc_pages_nodemask+0x22b/0x2730 [ 364.168749] ? __mutex_unlock_slowpath+0x75/0x780 [ 364.173607] ? __lock_acquire+0x655/0x42a0 [ 364.177838] ? set_blocksize+0x24b/0x2e0 [ 364.181899] ? lo_ioctl+0x8b5/0x1c00 [ 364.185608] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 364.190510] ? trace_hardirqs_on+0x10/0x10 [ 364.194785] ? blkpg_ioctl+0x8d0/0x8d0 [ 364.198677] ? trace_hardirqs_on+0x10/0x10 [ 364.202910] cache_grow_begin+0x91/0x410 [ 364.206959] cache_alloc_refill+0x28c/0x360 [ 364.211282] kmem_cache_alloc+0x333/0x3c0 [ 364.215421] getname_flags+0xc8/0x550 [ 364.219211] SyS_mkdirat+0x83/0x220 [ 364.222825] ? SyS_mknod+0x30/0x30 [ 364.226349] ? fput+0xb/0x140 [ 364.229441] ? do_syscall_64+0x4c/0x640 [ 364.233414] ? SyS_mkdirat+0x220/0x220 [ 364.237310] do_syscall_64+0x1d5/0x640 [ 364.241202] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 364.246384] RIP: 0033:0x45bed7 [ 364.249562] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 364.257300] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 364.264560] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 11:07:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 364.271829] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 364.279105] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 364.286367] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 364.304967] BTRFS error (device loop5): superblock checksum mismatch 11:07:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:07:59 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 364.345094] BTRFS error (device loop5): open_ctree failed [ 364.449508] FAULT_INJECTION: forcing a failure. [ 364.449508] name failslab, interval 1, probability 0, space 0, times 0 [ 364.481315] CPU: 0 PID: 12314 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 364.489247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.498606] Call Trace: [ 364.501203] dump_stack+0x1b2/0x283 [ 364.504837] should_fail.cold+0x10a/0x154 [ 364.508996] should_failslab+0xd6/0x130 [ 364.512975] kmem_cache_alloc+0x28e/0x3c0 [ 364.517130] getname_flags+0xc8/0x550 [ 364.520928] SyS_mkdirat+0x83/0x220 [ 364.524544] ? SyS_mknod+0x30/0x30 [ 364.528072] ? fput+0xb/0x140 [ 364.531164] ? do_syscall_64+0x4c/0x640 [ 364.535124] ? SyS_mkdirat+0x220/0x220 [ 364.538998] do_syscall_64+0x1d5/0x640 [ 364.542881] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 364.548055] RIP: 0033:0x45bed7 [ 364.551226] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 364.558933] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 364.566190] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 364.573446] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 364.580852] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 364.588109] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:01 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 366.189738] FAULT_INJECTION: forcing a failure. [ 366.189738] name failslab, interval 1, probability 0, space 0, times 0 [ 366.204761] CPU: 0 PID: 12329 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 366.212688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.222049] Call Trace: [ 366.224653] dump_stack+0x1b2/0x283 [ 366.228408] should_fail.cold+0x10a/0x154 [ 366.232578] should_failslab+0xd6/0x130 [ 366.236557] kmem_cache_alloc+0x28e/0x3c0 [ 366.240752] ? ext4_sync_fs+0x7e0/0x7e0 [ 366.244718] ext4_alloc_inode+0x19/0x610 [ 366.248758] ? ext4_sync_fs+0x7e0/0x7e0 [ 366.252711] alloc_inode+0x5d/0x170 [ 366.256394] new_inode_pseudo+0x14/0xe0 [ 366.260400] new_inode+0x1b/0x40 [ 366.263749] __ext4_new_inode+0x356/0x4e80 [ 366.267976] ? ext4_free_inode+0x14a0/0x14a0 [ 366.272503] ? avc_has_perm+0x1a4/0x320 [ 366.276477] ? __dquot_initialize+0x3f4/0x980 [ 366.280955] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 366.285635] ? inode_get_rsv_space.part.0+0x100/0x100 [ 366.290810] ? security_transition_sid+0xcb/0x120 [ 366.295674] ? security_transition_sid+0x9d/0x120 [ 366.300520] ext4_mkdir+0x2e4/0xb60 [ 366.304132] ? selinux_dentry_init_security+0x220/0x220 [ 366.309483] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 366.314139] ? security_inode_mkdir+0xcc/0x100 [ 366.318704] vfs_mkdir+0x3af/0x620 [ 366.322279] SyS_mkdirat+0x1b5/0x220 [ 366.326046] ? SyS_mknod+0x30/0x30 [ 366.329567] ? do_syscall_64+0x4c/0x640 [ 366.333521] ? SyS_mkdirat+0x220/0x220 [ 366.337408] do_syscall_64+0x1d5/0x640 [ 366.341279] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 366.346444] RIP: 0033:0x45bed7 [ 366.349607] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 366.357298] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 366.364548] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 366.371804] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 366.379057] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 366.386305] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x20) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x800, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000e1692aa9a60de34cbef75fab9408aa795a87975e30b31dc1a00a2182ce6f5", @ANYRES16=r5, @ANYBLOB="c18f00000000000000006b000000"], 0x14}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r9, 0x0, 0xa}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r5, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x824}, 0x4040000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$USBDEVFS_RESETEP(r7, 0x80045503, &(0x7f0000000300)={0xa, 0x1}) 11:08:01 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 366.478308] FAULT_INJECTION: forcing a failure. [ 366.478308] name failslab, interval 1, probability 0, space 0, times 0 [ 366.498399] CPU: 0 PID: 12343 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 366.506326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.515690] Call Trace: [ 366.518285] dump_stack+0x1b2/0x283 [ 366.521924] should_fail.cold+0x10a/0x154 [ 366.526093] should_failslab+0xd6/0x130 [ 366.530075] kmem_cache_alloc+0x28e/0x3c0 [ 366.534227] selinux_inode_alloc_security+0xb1/0x2a0 [ 366.539335] security_inode_alloc+0x8f/0xd0 [ 366.543663] inode_init_always+0x576/0xb10 [ 366.547904] alloc_inode+0x7a/0x170 [ 366.551914] new_inode_pseudo+0x14/0xe0 [ 366.551925] new_inode+0x1b/0x40 [ 366.559268] __ext4_new_inode+0x356/0x4e80 [ 366.563537] ? ext4_free_inode+0x14a0/0x14a0 [ 366.567958] ? avc_has_perm+0x1a4/0x320 [ 366.571945] ? __dquot_initialize+0x3f4/0x980 [ 366.576452] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 366.581142] ? inode_get_rsv_space.part.0+0x100/0x100 [ 366.586356] ? security_transition_sid+0xcb/0x120 [ 366.586369] ? security_transition_sid+0x9d/0x120 [ 366.596056] ext4_mkdir+0x2e4/0xb60 [ 366.599702] ? selinux_dentry_init_security+0x220/0x220 [ 366.605096] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 366.609773] ? security_inode_mkdir+0xcc/0x100 [ 366.614344] vfs_mkdir+0x3af/0x620 [ 366.617870] SyS_mkdirat+0x1b5/0x220 [ 366.621567] ? SyS_mknod+0x30/0x30 [ 366.625099] ? do_syscall_64+0x4c/0x640 [ 366.629063] ? SyS_mkdirat+0x220/0x220 [ 366.632952] do_syscall_64+0x1d5/0x640 [ 366.636841] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 366.642015] RIP: 0033:0x45bed7 [ 366.645185] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 366.652879] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 366.660131] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 366.667382] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 11:08:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getpid() setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r2 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='gretap0\x00'}) [ 366.674634] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 366.681889] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:02 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 366.886430] FAULT_INJECTION: forcing a failure. [ 366.886430] name failslab, interval 1, probability 0, space 0, times 0 [ 366.908672] CPU: 0 PID: 12372 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 366.916742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.926105] Call Trace: [ 366.928705] dump_stack+0x1b2/0x283 [ 366.932352] should_fail.cold+0x10a/0x154 [ 366.936519] should_failslab+0xd6/0x130 [ 366.940513] kmem_cache_alloc+0x28e/0x3c0 [ 366.944685] selinux_inode_alloc_security+0xb1/0x2a0 [ 366.949821] security_inode_alloc+0x8f/0xd0 [ 366.954163] inode_init_always+0x576/0xb10 [ 366.958418] alloc_inode+0x7a/0x170 [ 366.962060] new_inode_pseudo+0x14/0xe0 [ 366.966052] new_inode+0x1b/0x40 [ 366.969433] __ext4_new_inode+0x356/0x4e80 [ 366.973694] ? ext4_free_inode+0x14a0/0x14a0 [ 366.978119] ? avc_has_perm+0x1a4/0x320 [ 366.982105] ? __dquot_initialize+0x3f4/0x980 [ 366.986591] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 366.991249] ? inode_get_rsv_space.part.0+0x100/0x100 [ 366.996426] ? security_transition_sid+0xcb/0x120 [ 367.001251] ? security_transition_sid+0x9d/0x120 [ 367.006083] ext4_mkdir+0x2e4/0xb60 [ 367.009698] ? selinux_dentry_init_security+0x220/0x220 [ 367.015059] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 367.019730] ? security_inode_mkdir+0xcc/0x100 [ 367.024297] vfs_mkdir+0x3af/0x620 [ 367.027823] SyS_mkdirat+0x1b5/0x220 [ 367.031520] ? SyS_mknod+0x30/0x30 [ 367.035063] ? do_syscall_64+0x4c/0x640 [ 367.039040] ? SyS_mkdirat+0x220/0x220 [ 367.042917] do_syscall_64+0x1d5/0x640 [ 367.046796] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 367.051975] RIP: 0033:0x45bed7 [ 367.055306] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 367.063071] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 367.070326] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 367.077584] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 11:08:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 367.084839] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 367.092098] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:04 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 369.220326] FAULT_INJECTION: forcing a failure. [ 369.220326] name failslab, interval 1, probability 0, space 0, times 0 [ 369.232262] CPU: 1 PID: 12404 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 369.240167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.249532] Call Trace: [ 369.252134] dump_stack+0x1b2/0x283 [ 369.255786] should_fail.cold+0x10a/0x154 [ 369.260087] should_failslab+0xd6/0x130 [ 369.264085] kmem_cache_alloc+0x40/0x3c0 [ 369.268192] __es_insert_extent+0x241/0xe20 [ 369.272537] ext4_es_insert_extent+0x1b9/0x530 [ 369.277126] ? lock_downgrade+0x6e0/0x6e0 [ 369.281285] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 369.287085] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 369.292532] ? rcu_read_lock_sched_held+0x10a/0x130 [ 369.297557] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 369.303339] ext4_ext_put_gap_in_cache+0xbb/0xf0 [ 369.308085] ? ext4_zeroout_es+0x160/0x160 [ 369.312305] ? ext4_find_extent+0x66a/0x9f0 [ 369.316617] ext4_ext_map_blocks+0x1bbf/0x4b30 [ 369.321192] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 369.326201] ? ext4_es_lookup_extent+0x321/0xac0 [ 369.330952] ? lock_acquire+0x170/0x3f0 [ 369.334931] ? lock_acquire+0x170/0x3f0 [ 369.338901] ? ext4_map_blocks+0x3c7/0x1600 [ 369.343211] ext4_map_blocks+0xc8f/0x1600 [ 369.347363] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 369.352811] ? ext4_issue_zeroout+0x150/0x150 [ 369.357301] ? __ext4_new_inode+0x278/0x4e80 [ 369.361708] ext4_getblk+0x98/0x3f0 [ 369.365332] ? ext4_iomap_begin+0x7f0/0x7f0 [ 369.369661] ? __dquot_initialize+0x3f4/0x980 [ 369.374158] ext4_bread+0x6c/0x1a0 [ 369.377689] ? ext4_getblk+0x3f0/0x3f0 [ 369.381557] ? inode_get_rsv_space.part.0+0x100/0x100 [ 369.386740] ? security_transition_sid+0xcb/0x120 [ 369.391580] ? security_transition_sid+0x9d/0x120 [ 369.396421] ext4_append+0x143/0x350 [ 369.400162] ext4_mkdir+0x4c9/0xb60 [ 369.403776] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 369.408440] ? security_inode_mkdir+0xcc/0x100 [ 369.413015] vfs_mkdir+0x3af/0x620 [ 369.416551] SyS_mkdirat+0x1b5/0x220 [ 369.420249] ? SyS_mknod+0x30/0x30 [ 369.423772] ? do_syscall_64+0x4c/0x640 [ 369.427739] ? SyS_mkdirat+0x220/0x220 [ 369.431623] do_syscall_64+0x1d5/0x640 [ 369.435507] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 369.440683] RIP: 0033:0x45bed7 [ 369.443854] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 369.451549] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 369.458806] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 11:08:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x10, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1ff}, 0x10000, 0x0, 0x0, 0x5}, 0x0, 0xe, 0xffffffffffffffff, 0x0) clone(0xb0080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 369.466069] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 369.473344] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 369.480624] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 369.529273] BTRFS error (device loop5): superblock checksum mismatch [ 369.564629] BTRFS error (device loop5): open_ctree failed 11:08:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:05 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 369.839180] FAULT_INJECTION: forcing a failure. [ 369.839180] name failslab, interval 1, probability 0, space 0, times 0 [ 369.851555] CPU: 1 PID: 12434 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 369.859465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.868828] Call Trace: [ 369.871427] dump_stack+0x1b2/0x283 [ 369.875072] should_fail.cold+0x10a/0x154 [ 369.879236] should_failslab+0xd6/0x130 [ 369.883227] __kmalloc+0x2c1/0x400 [ 369.886783] ? ext4_find_extent+0x772/0x9f0 [ 369.891121] ext4_find_extent+0x772/0x9f0 [ 369.895300] ext4_ext_map_blocks+0x16f/0x4b30 [ 369.899819] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 369.904851] ? ext4_es_lookup_extent+0x321/0xac0 [ 369.909625] ? ext4_map_blocks+0x5c6/0x1600 [ 369.913964] ? lock_acquire+0x170/0x3f0 [ 369.917953] ? ext4_map_blocks+0x798/0x1600 [ 369.922296] ext4_map_blocks+0x7ea/0x1600 [ 369.926471] ? ext4_issue_zeroout+0x150/0x150 [ 369.930988] ? __ext4_new_inode+0x278/0x4e80 [ 369.935422] ext4_getblk+0x98/0x3f0 [ 369.939073] ? ext4_iomap_begin+0x7f0/0x7f0 [ 369.943413] ? __dquot_initialize+0x3f4/0x980 [ 369.947938] ext4_bread+0x6c/0x1a0 [ 369.951506] ? ext4_getblk+0x3f0/0x3f0 [ 369.955412] ? inode_get_rsv_space.part.0+0x100/0x100 [ 369.960726] ? security_transition_sid+0xcb/0x120 [ 369.965570] ? security_transition_sid+0x9d/0x120 [ 369.970425] ext4_append+0x143/0x350 [ 369.974141] ext4_mkdir+0x4c9/0xb60 [ 369.977762] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 369.982432] ? security_inode_mkdir+0xcc/0x100 [ 369.987010] vfs_mkdir+0x3af/0x620 [ 369.990542] SyS_mkdirat+0x1b5/0x220 [ 369.994245] ? SyS_mknod+0x30/0x30 [ 369.997779] ? do_syscall_64+0x4c/0x640 [ 370.001744] ? SyS_mkdirat+0x220/0x220 [ 370.005623] do_syscall_64+0x1d5/0x640 [ 370.009501] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 370.014678] RIP: 0033:0x45bed7 [ 370.017863] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 370.025576] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 370.032956] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 370.040212] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 370.047469] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 370.054889] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:05 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 370.142073] FAULT_INJECTION: forcing a failure. [ 370.142073] name failslab, interval 1, probability 0, space 0, times 0 [ 370.153679] CPU: 0 PID: 12452 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 370.161578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.170937] Call Trace: [ 370.173517] dump_stack+0x1b2/0x283 [ 370.177135] should_fail.cold+0x10a/0x154 [ 370.181273] should_failslab+0xd6/0x130 [ 370.185232] __kmalloc+0x2c1/0x400 [ 370.188927] ? ext4_find_extent+0x772/0x9f0 [ 370.193251] ext4_find_extent+0x772/0x9f0 [ 370.197401] ext4_ext_map_blocks+0x16f/0x4b30 [ 370.201890] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 370.206890] ? ext4_es_lookup_extent+0x321/0xac0 [ 370.211634] ? ext4_map_blocks+0x5c6/0x1600 [ 370.215946] ? lock_acquire+0x170/0x3f0 [ 370.219905] ? ext4_map_blocks+0x798/0x1600 [ 370.224229] ext4_map_blocks+0x7ea/0x1600 [ 370.228372] ? ext4_issue_zeroout+0x150/0x150 [ 370.232850] ? __ext4_new_inode+0x278/0x4e80 [ 370.237246] ext4_getblk+0x98/0x3f0 [ 370.240959] ? ext4_iomap_begin+0x7f0/0x7f0 [ 370.245265] ? __dquot_initialize+0x3f4/0x980 [ 370.249750] ext4_bread+0x6c/0x1a0 [ 370.253275] ? ext4_getblk+0x3f0/0x3f0 [ 370.257156] ? inode_get_rsv_space.part.0+0x100/0x100 [ 370.262416] ? security_transition_sid+0xcb/0x120 [ 370.267254] ? security_transition_sid+0x9d/0x120 [ 370.272089] ext4_append+0x143/0x350 [ 370.275793] ext4_mkdir+0x4c9/0xb60 [ 370.279419] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 370.284085] ? security_inode_mkdir+0xcc/0x100 [ 370.288657] vfs_mkdir+0x3af/0x620 [ 370.292185] SyS_mkdirat+0x1b5/0x220 [ 370.295894] ? SyS_mknod+0x30/0x30 [ 370.299439] ? do_syscall_64+0x4c/0x640 [ 370.303427] ? SyS_mkdirat+0x220/0x220 [ 370.307334] do_syscall_64+0x1d5/0x640 [ 370.311247] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 370.316445] RIP: 0033:0x45bed7 [ 370.319637] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 370.327354] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045bed7 [ 370.334628] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 370.341901] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 370.349177] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 370.356450] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) ioctl$vim2m_VIDIOC_STREAMOFF(r2, 0x40045612, &(0x7f00000001c0)=0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) clone(0x2000000, &(0x7f0000000000)="53f1716a923a6abf4c700635127146ba8fe9a4d22af8e0d6a850251f3923a374a74e2101a755a6321622cd508f6599", &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="49a87c5a1685fe0c3f58883b6e2464af48e2343808fdd21f8ee48a258e3306b0167b49b0e4401fa451779c8a7c62f7b35b5a04376daffde2ae99d839a3e679c746c51abb5d6d89588ebd2eea19f11a9ec04d57b01db872cbe0a3cf061661242d713e538d74a6e4900e2bd205e80375762451bd67dc98b8d912b659ad9aad1d77e68a45ccf11e34a7b9a06ab256bd15f377c7f207d8c62ce1bdeb07ff1a345f7411cc35631e1ea12c4916f243d3a66e") 11:08:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:07 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 372.218807] FAULT_INJECTION: forcing a failure. [ 372.218807] name failslab, interval 1, probability 0, space 0, times 0 [ 372.230348] CPU: 0 PID: 12477 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 372.238241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.247623] Call Trace: [ 372.250231] dump_stack+0x1b2/0x283 [ 372.253884] should_fail.cold+0x10a/0x154 [ 372.258055] should_failslab+0xd6/0x130 [ 372.262053] __kmalloc_track_caller+0x2bc/0x400 [ 372.266728] ? strndup_user+0x5b/0xf0 [ 372.270521] memdup_user+0x22/0xa0 [ 372.274206] strndup_user+0x5b/0xf0 [ 372.277879] ? copy_mnt_ns+0x8a0/0x8a0 [ 372.281752] SyS_mount+0x39/0x120 [ 372.285187] ? copy_mnt_ns+0x8a0/0x8a0 [ 372.289058] do_syscall_64+0x1d5/0x640 [ 372.292942] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 372.298114] RIP: 0033:0x45f4aa [ 372.301292] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 372.308998] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 372.316267] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 372.323523] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 372.330787] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 372.338045] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x1000, 0x2, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6c, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x400086) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140)={0xffffffffffffffff, r6, 0xf}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000040)={r5, 0x100, 0xf2, "cb6ddd1b90906b8c3079c56db36daa701c3a0274a4d56339c35afa1d7ebca88d9d35c98c153bb636c8b9efe2c325ea03e287bc2061112e82ee24604eb18e6d2f4f25df38a4f57eeb757a984c780a46392dc0fe794fc797f966a49ef83ff5097cd8905473d4a579306a20e646f8fbb5df13677622d58dd7fd82c57cd824709f07a5c3f369200e29574525773b5b9229aaf5b2b3e530f3ca9f126aa4b0a6a5eca3d173f7ec55a1e3afadf20ad5a4b38c5fed3331c2018f426054984e082a2778bf8662fafd05f909f5543d90935437c1c57a12de9b4c01580521ce64cd51a7ea4cae9f05f3babd6ee259a017050a0ec45aa22e"}, 0xfa) 11:08:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:07 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 372.547747] FAULT_INJECTION: forcing a failure. [ 372.547747] name failslab, interval 1, probability 0, space 0, times 0 [ 372.579491] CPU: 0 PID: 12496 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 372.587420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.596783] Call Trace: [ 372.599387] dump_stack+0x1b2/0x283 [ 372.603037] should_fail.cold+0x10a/0x154 [ 372.607207] should_failslab+0xd6/0x130 [ 372.611198] __kmalloc_track_caller+0x2bc/0x400 [ 372.615885] ? strndup_user+0x5b/0xf0 [ 372.619709] memdup_user+0x22/0xa0 [ 372.623272] strndup_user+0x5b/0xf0 [ 372.626914] ? copy_mnt_ns+0x8a0/0x8a0 [ 372.630812] SyS_mount+0x39/0x120 [ 372.634281] ? copy_mnt_ns+0x8a0/0x8a0 [ 372.638188] do_syscall_64+0x1d5/0x640 [ 372.642098] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 372.647302] RIP: 0033:0x45f4aa [ 372.650497] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 372.658225] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 372.665528] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 372.672802] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 372.680084] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 372.687364] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:08 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe, 0x0, 0x0, 0xff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x111000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x7fff, @loopback, 0x9}, @in6={0xa, 0x4e20, 0x9, @private2={0xfc, 0x2, [], 0x1}, 0x8}], 0x38) 11:08:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 372.933443] FAULT_INJECTION: forcing a failure. [ 372.933443] name failslab, interval 1, probability 0, space 0, times 0 [ 372.945142] CPU: 0 PID: 12538 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 372.953033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.962398] Call Trace: [ 372.964995] dump_stack+0x1b2/0x283 [ 372.968634] should_fail.cold+0x10a/0x154 [ 372.972787] should_failslab+0xd6/0x130 [ 372.976767] kmem_cache_alloc+0x40/0x3c0 [ 372.980841] __sigqueue_alloc+0x1b8/0x3e0 [ 372.984997] __send_signal+0x193/0x1280 [ 372.988997] force_sig_info+0x240/0x340 [ 372.992988] force_sig_info_fault.constprop.0+0x185/0x260 [ 372.998540] ? is_prefetch.isra.0.part.0+0x300/0x300 [ 373.003657] ? is_prefetch.isra.0.part.0+0x1fa/0x300 [ 373.008772] ? bad_area+0x4e/0x80 [ 373.012232] ? pgtable_bad+0x110/0x110 [ 373.016129] ? lock_downgrade+0x6e0/0x6e0 [ 373.020294] __bad_area_nosemaphore+0x1d6/0x2c0 [ 373.024974] ? up_read+0x17/0x30 [ 373.028351] __do_page_fault+0x842/0xb50 11:08:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 373.032422] ? mm_fault_error+0x2c0/0x2c0 [ 373.036574] ? do_page_fault+0x60/0x4f2 [ 373.040630] ? page_fault+0x2f/0x50 [ 373.044269] page_fault+0x45/0x50 [ 373.047721] RIP: 0c09:0x4ce514 11:08:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 373.050906] RSP: 5094e0:000000000078bf00 EFLAGS: 00000003 [ 373.180262] BTRFS error (device loop5): superblock checksum mismatch [ 373.224364] BTRFS error (device loop5): open_ctree failed 11:08:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:11 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 375.904789] FAULT_INJECTION: forcing a failure. [ 375.904789] name failslab, interval 1, probability 0, space 0, times 0 [ 375.950991] CPU: 1 PID: 12585 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 375.958919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.968280] Call Trace: [ 375.970884] dump_stack+0x1b2/0x283 [ 375.974535] should_fail.cold+0x10a/0x154 [ 375.978700] should_failslab+0xd6/0x130 [ 375.982686] __kmalloc_track_caller+0x2bc/0x400 [ 375.987368] ? strndup_user+0x5b/0xf0 [ 375.991187] memdup_user+0x22/0xa0 [ 375.994746] strndup_user+0x5b/0xf0 [ 375.998382] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.002281] SyS_mount+0x68/0x120 [ 376.005753] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.009660] do_syscall_64+0x1d5/0x640 [ 376.013572] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 376.018766] RIP: 0033:0x45f4aa [ 376.021952] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 376.029778] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 376.037052] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 376.044324] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 11:08:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 376.051584] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 376.058841] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f0000000100)=[0x0, 0x4], 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "b607cdaefe7c46d4", "c13003263bd287d74454765b8e2885d4", "c1aca9fa", "9bb02d662b80ed5b"}, 0x28) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x800, @empty, 0x4}, @in={0x2, 0x4e24, @remote}], 0x2c) 11:08:11 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 376.215417] FAULT_INJECTION: forcing a failure. [ 376.215417] name failslab, interval 1, probability 0, space 0, times 0 [ 376.242037] CPU: 1 PID: 12621 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 376.249968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.259487] Call Trace: [ 376.262098] dump_stack+0x1b2/0x283 [ 376.265748] should_fail.cold+0x10a/0x154 [ 376.269907] should_failslab+0xd6/0x130 [ 376.273899] __kmalloc_track_caller+0x2bc/0x400 [ 376.278582] ? strndup_user+0x5b/0xf0 [ 376.282402] memdup_user+0x22/0xa0 [ 376.285955] strndup_user+0x5b/0xf0 [ 376.289589] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.293490] SyS_mount+0x68/0x120 [ 376.296958] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.300865] do_syscall_64+0x1d5/0x640 [ 376.304769] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 376.309966] RIP: 0033:0x45f4aa 11:08:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) dup(r1) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 376.313157] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 376.320962] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 376.328242] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 376.335521] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 376.342803] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 376.350084] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:11 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 376.461154] FAULT_INJECTION: forcing a failure. [ 376.461154] name failslab, interval 1, probability 0, space 0, times 0 [ 376.493161] CPU: 1 PID: 12641 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 376.501092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.510455] Call Trace: [ 376.513066] dump_stack+0x1b2/0x283 [ 376.516713] should_fail.cold+0x10a/0x154 [ 376.520880] should_failslab+0xd6/0x130 [ 376.524873] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 376.529556] ? _copy_from_user+0x94/0x100 [ 376.533713] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.537622] copy_mount_options+0x59/0x2e0 [ 376.541875] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.545782] SyS_mount+0x84/0x120 [ 376.549244] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.553152] do_syscall_64+0x1d5/0x640 11:08:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init1(0xc0000) bind$vsock_stream(r1, &(0x7f0000000140)={0x28, 0x0, 0x2711}, 0x10) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 376.557067] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 376.562266] RIP: 0033:0x45f4aa [ 376.565465] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 376.573186] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 376.580462] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 376.587743] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 376.595017] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 376.602298] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:12 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 376.718777] FAULT_INJECTION: forcing a failure. [ 376.718777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 376.730755] CPU: 0 PID: 12658 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 376.738648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.748012] Call Trace: [ 376.750619] dump_stack+0x1b2/0x283 [ 376.754270] should_fail.cold+0x10a/0x154 [ 376.758444] __alloc_pages_nodemask+0x22b/0x2730 [ 376.763223] ? __lock_acquire+0x655/0x42a0 [ 376.767632] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 376.772116] ? __kmalloc_track_caller+0x155/0x400 [ 376.776945] ? memdup_user+0x22/0xa0 [ 376.780642] ? strndup_user+0x5b/0xf0 [ 376.784435] ? SyS_mount+0x68/0x120 [ 376.788057] ? do_syscall_64+0x1d5/0x640 [ 376.792104] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 376.797577] ? __might_fault+0x104/0x1b0 [ 376.801657] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 376.806499] ? trace_hardirqs_on+0x10/0x10 [ 376.810749] ? rcu_read_lock_sched_held+0x10a/0x130 [ 376.815756] ? do_signal+0x3fc/0x15d0 [ 376.819547] ? __might_fault+0x104/0x1b0 [ 376.823597] cache_grow_begin+0x91/0x410 [ 376.827734] cache_alloc_refill+0x28c/0x360 [ 376.832059] kmem_cache_alloc_trace+0x35b/0x3f0 [ 376.836739] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.840622] copy_mount_options+0x59/0x2e0 [ 376.844854] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.848741] SyS_mount+0x84/0x120 [ 376.852185] ? copy_mnt_ns+0x8a0/0x8a0 [ 376.856060] do_syscall_64+0x1d5/0x640 [ 376.859937] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 376.865128] RIP: 0033:0x45f4aa [ 376.868299] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 376.875991] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 376.883243] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 376.890503] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 376.897766] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 376.905017] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 376.922556] BTRFS error (device loop5): superblock checksum mismatch [ 376.964124] BTRFS error (device loop5): open_ctree failed 11:08:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000280)) socket(0x0, 0x0, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x6, 0x6, 0x301, 0x0, 0x0, {0x7, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x805}, 0x4000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000001c0)) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) ioctl$FBIOGET_CON2FBMAP(r3, 0x460f, &(0x7f0000000140)={0x23, 0x2}) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:14 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 378.998837] FAULT_INJECTION: forcing a failure. [ 378.998837] name failslab, interval 1, probability 0, space 0, times 0 [ 379.021881] CPU: 1 PID: 12693 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 379.029815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.039180] Call Trace: [ 379.041781] dump_stack+0x1b2/0x283 [ 379.045438] should_fail.cold+0x10a/0x154 [ 379.049615] should_failslab+0xd6/0x130 [ 379.053615] __kmalloc_track_caller+0x2bc/0x400 [ 379.058307] ? kstrdup_const+0x35/0x60 [ 379.062208] ? lock_downgrade+0x6e0/0x6e0 [ 379.066517] kstrdup+0x36/0x70 [ 379.069743] kstrdup_const+0x35/0x60 [ 379.073477] alloc_vfsmnt+0xe0/0x7c0 [ 379.077214] vfs_kern_mount.part.0+0x27/0x3c0 [ 379.081730] do_mount+0x3c9/0x25e0 [ 379.085306] ? copy_mount_string+0x40/0x40 [ 379.089560] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 379.094431] ? copy_mnt_ns+0x8a0/0x8a0 11:08:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "a80e26bc33e84574", "3e908572a20c3aa28d8b4b583599f8e5", "0ce9e3ad", "0a331db62b1aa040"}, 0x28) get_thread_area(&(0x7f0000000000)={0x8001, 0x20001000, 0x1000, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = accept(0xffffffffffffffff, &(0x7f0000000240)=@ipx, &(0x7f00000002c0)=0x80) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r3, 0x200, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0xc}, 0x10) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x400086) sendmsg$AUDIT_MAKE_EQUIV(r5, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x3f7, 0x20, 0x70bd27, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20009040}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') 11:08:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 379.098344] ? copy_mount_options+0x1ec/0x2e0 [ 379.102849] ? copy_mnt_ns+0x8a0/0x8a0 [ 379.106726] SyS_mount+0xa8/0x120 [ 379.110171] ? copy_mnt_ns+0x8a0/0x8a0 [ 379.114072] do_syscall_64+0x1d5/0x640 [ 379.117978] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 379.123180] RIP: 0033:0x45f4aa [ 379.126376] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 379.134589] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 379.141998] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 379.149281] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 379.156564] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 379.163843] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:14 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 379.278674] FAULT_INJECTION: forcing a failure. [ 379.278674] name failslab, interval 1, probability 0, space 0, times 0 [ 379.290408] CPU: 1 PID: 12719 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 379.298311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.307672] Call Trace: [ 379.310274] dump_stack+0x1b2/0x283 [ 379.313927] should_fail.cold+0x10a/0x154 [ 379.318086] should_failslab+0xd6/0x130 [ 379.322077] __kmalloc_track_caller+0x2bc/0x400 [ 379.326837] ? btrfs_parse_early_options+0xa3/0x310 [ 379.331891] kstrdup+0x36/0x70 [ 379.335100] btrfs_parse_early_options+0xa3/0x310 [ 379.339957] ? __lock_acquire+0x655/0x42a0 [ 379.344213] ? btrfs_kill_super+0x540/0x540 [ 379.348548] ? lock_acquire+0x170/0x3f0 [ 379.352513] ? pcpu_alloc+0x86f/0xf70 [ 379.356365] ? trace_hardirqs_on+0x10/0x10 [ 379.360580] ? pcpu_alloc+0x86f/0xf70 [ 379.364367] ? __mutex_lock+0x2cb/0x1430 [ 379.368409] ? kstrdup_const+0x35/0x60 [ 379.372285] btrfs_mount+0x119/0x2838 [ 379.376074] ? lock_downgrade+0x6e0/0x6e0 [ 379.380211] ? _find_next_bit+0xdb/0x100 [ 379.384271] ? pcpu_alloc+0x37d/0xf70 [ 379.388058] ? btrfs_remount+0x10c0/0x10c0 [ 379.392302] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 379.397762] ? rcu_read_lock_sched_held+0x10a/0x130 [ 379.402769] ? pcpu_alloc+0xe1/0xf70 [ 379.406474] ? pcpu_find_block_fit+0x380/0x380 [ 379.411038] ? __lockdep_init_map+0x100/0x560 [ 379.415517] ? __lockdep_init_map+0x100/0x560 [ 379.420001] mount_fs+0x92/0x2a0 [ 379.423357] vfs_kern_mount.part.0+0x5b/0x3c0 [ 379.427838] do_mount+0x3c9/0x25e0 [ 379.431365] ? copy_mount_string+0x40/0x40 [ 379.435588] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 379.440426] ? copy_mnt_ns+0x8a0/0x8a0 [ 379.444315] ? copy_mount_options+0x1ec/0x2e0 [ 379.448806] ? copy_mnt_ns+0x8a0/0x8a0 [ 379.452727] SyS_mount+0xa8/0x120 [ 379.456165] ? copy_mnt_ns+0x8a0/0x8a0 [ 379.460037] do_syscall_64+0x1d5/0x640 [ 379.463916] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 379.469089] RIP: 0033:0x45f4aa 11:08:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x21, 0x0, 0x1e) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8281, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 379.472299] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 379.479991] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 379.487250] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 379.494617] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 379.501973] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 379.509228] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:15 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 379.638080] FAULT_INJECTION: forcing a failure. [ 379.638080] name failslab, interval 1, probability 0, space 0, times 0 [ 379.663535] CPU: 1 PID: 12736 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 379.671463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.680826] Call Trace: [ 379.683436] dump_stack+0x1b2/0x283 [ 379.687092] should_fail.cold+0x10a/0x154 [ 379.691250] should_failslab+0xd6/0x130 [ 379.695301] __kmalloc_track_caller+0x2bc/0x400 [ 379.699964] ? btrfs_parse_early_options+0xa3/0x310 [ 379.704982] kstrdup+0x36/0x70 [ 379.708167] btrfs_parse_early_options+0xa3/0x310 [ 379.713003] ? __lock_acquire+0x655/0x42a0 [ 379.717226] ? btrfs_kill_super+0x540/0x540 [ 379.721530] ? lock_acquire+0x170/0x3f0 [ 379.725494] ? pcpu_alloc+0x86f/0xf70 [ 379.729277] ? _find_next_bit+0xdb/0x100 [ 379.733412] ? pcpu_next_unpop+0x8c/0x100 [ 379.737548] btrfs_mount+0x119/0x2838 [ 379.741339] ? lock_downgrade+0x6e0/0x6e0 [ 379.745473] ? _find_next_bit+0xdb/0x100 [ 379.749522] ? pcpu_alloc+0x37d/0xf70 [ 379.753314] ? btrfs_remount+0x10c0/0x10c0 [ 379.757567] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 379.763007] ? rcu_read_lock_sched_held+0x10a/0x130 [ 379.768011] ? pcpu_alloc+0xe1/0xf70 [ 379.771724] ? pcpu_find_block_fit+0x380/0x380 [ 379.776300] ? __lockdep_init_map+0x100/0x560 [ 379.780783] ? __lockdep_init_map+0x100/0x560 [ 379.785267] mount_fs+0x92/0x2a0 [ 379.788623] vfs_kern_mount.part.0+0x5b/0x3c0 [ 379.793104] vfs_kern_mount+0x3c/0x60 [ 379.796892] btrfs_mount+0x2a0/0x2838 [ 379.800690] ? _find_next_bit+0xdb/0x100 [ 379.804750] ? pcpu_alloc+0x37d/0xf70 [ 379.808543] ? btrfs_remount+0x10c0/0x10c0 [ 379.812771] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 379.818206] ? rcu_read_lock_sched_held+0x10a/0x130 [ 379.823206] ? pcpu_alloc+0xe1/0xf70 [ 379.826907] ? pcpu_find_block_fit+0x380/0x380 [ 379.831472] ? __lockdep_init_map+0x100/0x560 [ 379.835951] ? __lockdep_init_map+0x100/0x560 [ 379.840433] mount_fs+0x92/0x2a0 [ 379.843795] vfs_kern_mount.part.0+0x5b/0x3c0 [ 379.848282] do_mount+0x3c9/0x25e0 [ 379.851815] ? copy_mount_string+0x40/0x40 [ 379.856033] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 379.860862] ? copy_mnt_ns+0x8a0/0x8a0 [ 379.864739] ? copy_mount_options+0x1ec/0x2e0 [ 379.869216] ? copy_mnt_ns+0x8a0/0x8a0 [ 379.873088] SyS_mount+0xa8/0x120 [ 379.876525] ? copy_mnt_ns+0x8a0/0x8a0 [ 379.880405] do_syscall_64+0x1d5/0x640 [ 379.884285] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 379.889460] RIP: 0033:0x45f4aa [ 379.892630] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 379.900319] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 379.907574] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 379.914829] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 379.922083] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 379.929360] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:15 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 380.032094] FAULT_INJECTION: forcing a failure. [ 380.032094] name failslab, interval 1, probability 0, space 0, times 0 [ 380.053219] CPU: 0 PID: 12745 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 380.061155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.070515] Call Trace: [ 380.073124] dump_stack+0x1b2/0x283 [ 380.076764] should_fail.cold+0x10a/0x154 [ 380.080907] should_failslab+0xd6/0x130 [ 380.084880] kmem_cache_alloc+0x28e/0x3c0 [ 380.089047] alloc_vfsmnt+0x23/0x7c0 [ 380.092784] vfs_kern_mount.part.0+0x27/0x3c0 [ 380.097291] vfs_kern_mount+0x3c/0x60 [ 380.101208] btrfs_mount+0x2a0/0x2838 [ 380.105021] ? _find_next_bit+0xdb/0x100 [ 380.109078] ? pcpu_alloc+0x37d/0xf70 [ 380.112865] ? btrfs_remount+0x10c0/0x10c0 [ 380.117085] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 380.122594] ? rcu_read_lock_sched_held+0x10a/0x130 [ 380.127593] ? pcpu_alloc+0xe1/0xf70 [ 380.131293] ? pcpu_find_block_fit+0x380/0x380 [ 380.135858] ? __lockdep_init_map+0x100/0x560 [ 380.140336] ? __lockdep_init_map+0x100/0x560 [ 380.144813] mount_fs+0x92/0x2a0 [ 380.148164] vfs_kern_mount.part.0+0x5b/0x3c0 [ 380.152644] do_mount+0x3c9/0x25e0 [ 380.156169] ? copy_mount_string+0x40/0x40 [ 380.160387] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 380.165211] ? copy_mnt_ns+0x8a0/0x8a0 [ 380.169082] ? copy_mount_options+0x1ec/0x2e0 [ 380.173556] ? copy_mnt_ns+0x8a0/0x8a0 [ 380.177433] SyS_mount+0xa8/0x120 [ 380.180869] ? copy_mnt_ns+0x8a0/0x8a0 [ 380.184747] do_syscall_64+0x1d5/0x640 [ 380.188625] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 380.193807] RIP: 0033:0x45f4aa [ 380.196981] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 380.204673] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 380.211980] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 380.219234] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 380.226501] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 380.233758] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x11, 0xa, 0x4) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) 11:08:17 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 381.926187] FAULT_INJECTION: forcing a failure. [ 381.926187] name failslab, interval 1, probability 0, space 0, times 0 [ 381.937820] CPU: 0 PID: 12756 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 381.945715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.955078] Call Trace: [ 381.957701] dump_stack+0x1b2/0x283 [ 381.961347] should_fail.cold+0x10a/0x154 [ 381.965520] should_failslab+0xd6/0x130 [ 381.969513] __kmalloc_track_caller+0x2bc/0x400 [ 381.974203] ? kstrdup_const+0x35/0x60 [ 381.978095] ? lock_downgrade+0x6e0/0x6e0 [ 381.982248] kstrdup+0x36/0x70 [ 381.985441] kstrdup_const+0x35/0x60 [ 381.989162] alloc_vfsmnt+0xe0/0x7c0 [ 381.992883] vfs_kern_mount.part.0+0x27/0x3c0 [ 381.997386] vfs_kern_mount+0x3c/0x60 [ 382.001196] btrfs_mount+0x2a0/0x2838 [ 382.005010] ? _find_next_bit+0xdb/0x100 [ 382.009077] ? pcpu_alloc+0x37d/0xf70 [ 382.012883] ? btrfs_remount+0x10c0/0x10c0 [ 382.017128] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 382.022599] ? rcu_read_lock_sched_held+0x10a/0x130 [ 382.027634] ? pcpu_alloc+0xe1/0xf70 [ 382.031562] ? pcpu_find_block_fit+0x380/0x380 [ 382.036131] ? __lockdep_init_map+0x100/0x560 [ 382.040610] ? __lockdep_init_map+0x100/0x560 [ 382.045089] mount_fs+0x92/0x2a0 [ 382.048442] vfs_kern_mount.part.0+0x5b/0x3c0 [ 382.052923] do_mount+0x3c9/0x25e0 [ 382.056452] ? copy_mount_string+0x40/0x40 [ 382.060674] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 382.065502] ? copy_mnt_ns+0x8a0/0x8a0 [ 382.069481] ? copy_mount_options+0x1ec/0x2e0 [ 382.073966] ? copy_mnt_ns+0x8a0/0x8a0 [ 382.077848] SyS_mount+0xa8/0x120 [ 382.081308] ? copy_mnt_ns+0x8a0/0x8a0 [ 382.085198] do_syscall_64+0x1d5/0x640 [ 382.089087] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 382.094272] RIP: 0033:0x45f4aa [ 382.097469] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 382.105196] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 382.112460] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 382.119716] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 11:08:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 382.126981] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 382.134236] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:17 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x88, 0xb, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x58, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x7}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x24040885}, 0xc0408d4) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x29aa22, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x1000000, @private1={0xfc, 0x1, [], 0x7f}, 0x9}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x3c) [ 382.205176] print_req_error: I/O error, dev loop5, sector 0 [ 382.280648] FAULT_INJECTION: forcing a failure. [ 382.280648] name failslab, interval 1, probability 0, space 0, times 0 [ 382.331352] CPU: 1 PID: 12783 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 382.339287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.348646] Call Trace: [ 382.351261] dump_stack+0x1b2/0x283 [ 382.354902] should_fail.cold+0x10a/0x154 [ 382.359065] should_failslab+0xd6/0x130 [ 382.363044] kmem_cache_alloc+0x28e/0x3c0 [ 382.367200] alloc_vfsmnt+0x23/0x7c0 [ 382.370917] vfs_kern_mount.part.0+0x27/0x3c0 [ 382.375419] vfs_kern_mount+0x3c/0x60 [ 382.379226] btrfs_mount+0x2a0/0x2838 [ 382.383036] ? _find_next_bit+0xdb/0x100 [ 382.387110] ? pcpu_alloc+0x37d/0xf70 [ 382.390914] ? btrfs_remount+0x10c0/0x10c0 [ 382.395157] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 382.400622] ? rcu_read_lock_sched_held+0x10a/0x130 [ 382.405651] ? pcpu_alloc+0xe1/0xf70 [ 382.409389] ? pcpu_find_block_fit+0x380/0x380 [ 382.413991] ? __lockdep_init_map+0x100/0x560 [ 382.418496] ? __lockdep_init_map+0x100/0x560 [ 382.423005] mount_fs+0x92/0x2a0 [ 382.426382] vfs_kern_mount.part.0+0x5b/0x3c0 [ 382.430891] do_mount+0x3c9/0x25e0 [ 382.434441] ? copy_mount_string+0x40/0x40 [ 382.438681] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 382.443530] ? copy_mnt_ns+0x8a0/0x8a0 [ 382.447428] ? copy_mount_options+0x1ec/0x2e0 [ 382.451929] ? copy_mnt_ns+0x8a0/0x8a0 [ 382.455823] SyS_mount+0xa8/0x120 [ 382.459278] ? copy_mnt_ns+0x8a0/0x8a0 [ 382.463173] do_syscall_64+0x1d5/0x640 [ 382.467090] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 382.472404] RIP: 0033:0x45f4aa [ 382.475603] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 382.483319] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 382.490598] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 382.497875] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 382.505153] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 382.512429] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) dup(r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:18 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 382.754253] FAULT_INJECTION: forcing a failure. [ 382.754253] name failslab, interval 1, probability 0, space 0, times 0 [ 382.782114] CPU: 0 PID: 12806 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 382.790039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.799401] Call Trace: [ 382.801999] dump_stack+0x1b2/0x283 [ 382.805636] should_fail.cold+0x10a/0x154 [ 382.809894] should_failslab+0xd6/0x130 [ 382.813863] __kmalloc_track_caller+0x2bc/0x400 [ 382.818578] ? btrfs_parse_early_options+0xa3/0x310 [ 382.823586] kstrdup+0x36/0x70 [ 382.826778] btrfs_parse_early_options+0xa3/0x310 [ 382.831619] ? __lock_acquire+0x655/0x42a0 [ 382.835838] ? btrfs_kill_super+0x540/0x540 [ 382.840152] ? lock_acquire+0x170/0x3f0 [ 382.844130] ? pcpu_alloc+0x86f/0xf70 [ 382.847935] ? _find_next_bit+0xdb/0x100 [ 382.851995] ? pcpu_next_unpop+0x8c/0x100 [ 382.856134] btrfs_mount+0x119/0x2838 [ 382.859922] ? lock_downgrade+0x6e0/0x6e0 [ 382.864054] ? _find_next_bit+0xdb/0x100 [ 382.868102] ? pcpu_alloc+0x37d/0xf70 [ 382.871890] ? btrfs_remount+0x10c0/0x10c0 [ 382.876117] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 382.881554] ? rcu_read_lock_sched_held+0x10a/0x130 [ 382.886558] ? pcpu_alloc+0xe1/0xf70 [ 382.890258] ? pcpu_find_block_fit+0x380/0x380 [ 382.894823] ? __lockdep_init_map+0x100/0x560 [ 382.899306] ? __lockdep_init_map+0x100/0x560 [ 382.903791] mount_fs+0x92/0x2a0 [ 382.907145] vfs_kern_mount.part.0+0x5b/0x3c0 [ 382.911627] vfs_kern_mount+0x3c/0x60 [ 382.915419] btrfs_mount+0x2a0/0x2838 [ 382.919212] ? _find_next_bit+0xdb/0x100 [ 382.923260] ? pcpu_alloc+0x37d/0xf70 [ 382.927048] ? btrfs_remount+0x10c0/0x10c0 [ 382.931271] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 382.936712] ? rcu_read_lock_sched_held+0x10a/0x130 [ 382.941714] ? pcpu_alloc+0xe1/0xf70 [ 382.945417] ? pcpu_find_block_fit+0x380/0x380 [ 382.950008] ? __lockdep_init_map+0x100/0x560 [ 382.954488] ? __lockdep_init_map+0x100/0x560 [ 382.958983] mount_fs+0x92/0x2a0 [ 382.962347] vfs_kern_mount.part.0+0x5b/0x3c0 [ 382.966841] do_mount+0x3c9/0x25e0 [ 382.970375] ? copy_mount_string+0x40/0x40 [ 382.974610] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 382.979449] ? copy_mnt_ns+0x8a0/0x8a0 [ 382.983323] ? copy_mount_options+0x1ec/0x2e0 [ 382.987802] ? copy_mnt_ns+0x8a0/0x8a0 [ 382.991677] SyS_mount+0xa8/0x120 [ 382.995114] ? copy_mnt_ns+0x8a0/0x8a0 [ 382.998997] do_syscall_64+0x1d5/0x640 11:08:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRESDEC], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23, @private=0xa010102}}, 0x4, 0x1, 0x10000, 0x2804, 0x4, 0x6cd, 0xf0}, &(0x7f0000000100)=0x9c) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0x990000, 0x400, 0x9, r1, 0x0, &(0x7f0000000040)={0x990aff, 0x1ff, [], @p_u8=&(0x7f0000000000)=0xd5}}) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xb06}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 383.002882] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 383.008056] RIP: 0033:0x45f4aa [ 383.011232] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 383.018937] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 383.026204] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 383.033468] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 383.040726] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 383.047986] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:18 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 383.160862] FAULT_INJECTION: forcing a failure. [ 383.160862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 383.181969] CPU: 0 PID: 12819 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 383.189900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.199268] Call Trace: [ 383.201880] dump_stack+0x1b2/0x283 [ 383.205537] should_fail.cold+0x10a/0x154 [ 383.209711] __alloc_pages_nodemask+0x22b/0x2730 [ 383.214501] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 383.219630] ? debug_object_activate+0x450/0x450 [ 383.224405] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 383.229261] ? btrfs_parse_early_options+0x19d/0x310 [ 383.234386] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 383.239427] ? __lock_acquire+0x655/0x42a0 [ 383.243664] ? btrfs_kill_super+0x540/0x540 [ 383.248112] ? lock_acquire+0x170/0x3f0 [ 383.252108] alloc_pages_current+0xe7/0x1e0 [ 383.256442] __get_free_pages+0xb/0x40 [ 383.260336] parse_security_options+0x1a/0x90 [ 383.264858] btrfs_mount+0x502/0x2838 [ 383.268677] ? _find_next_bit+0xdb/0x100 [ 383.272746] ? pcpu_alloc+0x37d/0xf70 [ 383.276563] ? btrfs_remount+0x10c0/0x10c0 [ 383.280842] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 383.286313] ? rcu_read_lock_sched_held+0x10a/0x130 [ 383.291340] ? pcpu_alloc+0xe1/0xf70 [ 383.295078] ? __lockdep_init_map+0x100/0x560 [ 383.299586] ? __lockdep_init_map+0x100/0x560 [ 383.304102] mount_fs+0x92/0x2a0 [ 383.307489] vfs_kern_mount.part.0+0x5b/0x3c0 [ 383.311994] vfs_kern_mount+0x3c/0x60 [ 383.315781] btrfs_mount+0x2a0/0x2838 [ 383.319565] ? _find_next_bit+0xdb/0x100 [ 383.323614] ? pcpu_alloc+0x37d/0xf70 [ 383.327404] ? btrfs_remount+0x10c0/0x10c0 [ 383.331631] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 383.337067] ? rcu_read_lock_sched_held+0x10a/0x130 [ 383.342063] ? pcpu_alloc+0xe1/0xf70 [ 383.345764] ? pcpu_find_block_fit+0x380/0x380 [ 383.350328] ? __lockdep_init_map+0x100/0x560 [ 383.354808] ? __lockdep_init_map+0x100/0x560 [ 383.359285] mount_fs+0x92/0x2a0 [ 383.362635] vfs_kern_mount.part.0+0x5b/0x3c0 [ 383.367117] do_mount+0x3c9/0x25e0 [ 383.370642] ? copy_mount_string+0x40/0x40 [ 383.374860] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 383.379685] ? copy_mnt_ns+0x8a0/0x8a0 [ 383.383557] ? copy_mount_options+0x1ec/0x2e0 [ 383.388033] ? copy_mnt_ns+0x8a0/0x8a0 [ 383.391902] SyS_mount+0xa8/0x120 [ 383.395337] ? copy_mnt_ns+0x8a0/0x8a0 [ 383.399210] do_syscall_64+0x1d5/0x640 [ 383.403088] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 383.408267] RIP: 0033:0x45f4aa [ 383.411436] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 383.419125] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 383.426377] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 383.433634] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 383.440892] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 383.448144] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) finit_module(r1, &(0x7f0000000000)='(\\&+@\x00', 0x2) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0xad}, 0x0) setpriority(0x0, r3, 0x0) prlimit64(r3, 0x1, &(0x7f0000000040)={0x3ff, 0xa1}, &(0x7f0000000080)) 11:08:20 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 384.954637] FAULT_INJECTION: forcing a failure. [ 384.954637] name failslab, interval 1, probability 0, space 0, times 0 [ 384.966177] CPU: 0 PID: 12837 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 384.974071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.983434] Call Trace: [ 384.986041] dump_stack+0x1b2/0x283 [ 384.989690] should_fail.cold+0x10a/0x154 [ 384.993867] should_failslab+0xd6/0x130 [ 384.997851] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 385.002536] selinux_parse_opts_str+0x4f8/0xa00 [ 385.007223] ? debug_object_activate+0x450/0x450 [ 385.012007] ? selinux_key_alloc+0x1a0/0x1a0 [ 385.016440] ? selinux_sb_copy_data+0x206/0x380 [ 385.021134] security_sb_parse_opts_str+0x6e/0xa0 [ 385.025995] parse_security_options+0x49/0x90 [ 385.030510] btrfs_mount+0x502/0x2838 [ 385.034332] ? _find_next_bit+0xdb/0x100 [ 385.038284] audit: type=1400 audit(1592910500.458:15): avc: denied { module_load } for pid=12835 comm="syz-executor.4" path="/root/syzkaller-testdir458115315/syzkaller.zFd5QN/224/memory.events" dev="sda1" ino=16499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=system permissive=1 [ 385.038396] ? pcpu_alloc+0x37d/0xf70 [ 385.071112] ? btrfs_remount+0x10c0/0x10c0 [ 385.075372] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 385.080839] ? rcu_read_lock_sched_held+0x10a/0x130 [ 385.085989] ? pcpu_alloc+0xe1/0xf70 [ 385.089836] ? __lockdep_init_map+0x100/0x560 [ 385.094343] ? __lockdep_init_map+0x100/0x560 [ 385.098965] mount_fs+0x92/0x2a0 [ 385.102344] vfs_kern_mount.part.0+0x5b/0x3c0 [ 385.106855] vfs_kern_mount+0x3c/0x60 [ 385.110672] btrfs_mount+0x2a0/0x2838 [ 385.114491] ? _find_next_bit+0xdb/0x100 [ 385.118562] ? pcpu_alloc+0x37d/0xf70 [ 385.122380] ? btrfs_remount+0x10c0/0x10c0 [ 385.126641] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 385.132106] ? rcu_read_lock_sched_held+0x10a/0x130 [ 385.137260] ? pcpu_alloc+0xe1/0xf70 [ 385.141000] ? pcpu_find_block_fit+0x380/0x380 [ 385.145603] ? __lockdep_init_map+0x100/0x560 [ 385.150113] ? __lockdep_init_map+0x100/0x560 [ 385.154626] mount_fs+0x92/0x2a0 [ 385.158013] vfs_kern_mount.part.0+0x5b/0x3c0 [ 385.162520] do_mount+0x3c9/0x25e0 [ 385.166054] ? copy_mount_string+0x40/0x40 [ 385.170274] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 385.175105] ? copy_mnt_ns+0x8a0/0x8a0 [ 385.178990] ? copy_mount_options+0x1ec/0x2e0 [ 385.183467] ? copy_mnt_ns+0x8a0/0x8a0 [ 385.187344] SyS_mount+0xa8/0x120 [ 385.190797] ? copy_mnt_ns+0x8a0/0x8a0 [ 385.194694] do_syscall_64+0x1d5/0x640 [ 385.198603] entry_SYSCALL_64_after_hwframe+0x46/0xbb 11:08:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x2, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x404400, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x4, 0x1, 0x301, 0x0, 0x0, {0x0, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000c010}, 0x404c006) sendmmsg$alg(r2, &(0x7f0000005940)=[{0x0, 0x0, &(0x7f0000003600)=[{&(0x7f0000000300)="966fcf63d5185a3e4ce4baa97143e6ecf5163e5af5398226dc212ac18c112d3d9ded70ab237bef944465ae5102e3d92774326baff156f21dc6", 0x39}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="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", 0x1000}, {&(0x7f0000003480)="7e702d9a0a1ae4e50c7b73570fc0efe5e321697da08b1d93cd21fe27b943a9e1bc575403af4c9f7cd6c5e1104c0d7835d28056c3432e343bc9a1e07762179ffe09ecb1803430f2bcd621e8cb5e637f00909b0830e1bf2532397e8957661f4cf8d2d6a5fffcc9785b6b05001a6c42c197746fb7cdb10ea8d43f195dee94b57491719b5d9f656aebd5f56186343aaa8f87de0f02eb7daa7d3a", 0x98}, {&(0x7f0000003540)="1b106abaed634d379cb56fcdbbcc484f38e8958291c66d6665c96d0bd5ecb84603a5c1ca688502e5a051bc00a14eacfc2ef7212561edfa8d08f3f6cb12", 0x3d}, {&(0x7f0000003580)="d9b60d9e5fdda92568b251ab3a58d2b2db19d9ce78aa0df5d737b3ced355930c8038f0952c287da8d3b9c983d9826bc909287b2a3d03531cb79317ddba6b68e38f56a177f25eff0e1acc4ce49c8aff49347808b0773bdc", 0x57}], 0x6, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7f}, @iv={0xb8, 0x117, 0x2, 0xa4, "1f287178ba3d4e4fed95f8cc3f801b80e80d2d48e7895f71c79d377e53a9b682e6c072c2e1ffe1cb48edf5923a6d3b54b2b36f4a1ce26e8c2276596e246d6ccd7adc647d33c2115f87a52ffa1ed89b6730dea5273be253bece471dadd644b24f49b153d5ddcd97fa2819dcfcb25f66050ebae76f8ecfaf04fb429c0bd804820fd7fdc809321b6005e5a169ca72b3d24d347380e466c377f492e32894020ed2cfe4d51b30"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xfe}, @assoc={0x18, 0x117, 0x4, 0x7fffffff}, @assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18, 0x117, 0x3, 0x1}], 0x160}, {0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000004c0)="09b7000011e8343de46f0d7ff297c2183f567c8d7533d93ac101e4e370ef1875e5451d1021934df6d11980a7ca1c3622ce71fa5a941d58d5388cef6ab9addded1fab011ca3d511121650c939441d3e9d38040000e1fbeb6eb91e3152f832ee8e240343c421d81c70b7e0042e8817f8b8db69f9b7b228248a0468e7b3a6c03429066803000000000000004b3dd2eca7a1d5e605b4bfe0f506ac900e", 0x9b}, {&(0x7f0000000580)="4f45eb1f4564739cc0553a9b21463d967a1725d843140068ac35f1ad58cbfae469da4160a959acb0a38029a134e94b766eff10b628327712b65ba493fa05d438e0dd8b68c6857cb3ea0120ec65f2b2c7e6ab0b07c91258496980f7bb608b810b036fc9425b52a16a3a7d7c28ab62d74867bc78549e89b5c307f2ff4e8b33ff39e55266d30d63fef6078cbd3bc885c5b39f18cf6ab9be11fb0748689cd6f1cf", 0x9f}, {&(0x7f0000000980)="543c19f1f168577813363dbf5267d42adf2f653cf1015bc699f23b856477515e3b925816def0ed53ae31a04a5f6f1a591a177a36c27f3cdc2edfb492de771f21549da3d8c86a09e2bca9880f251f7a71775656e9775ff7910bda4a596a1bd4312147aea2eb3d349fbc2e76ce1db2814e26b768325a06d62d908e4ed5b587b25d85b2faba6e6f8c19a2bf27353078182beba1e74f88a7cf7c1c91d1138f72b25053cf856f4f24e9fb0ef4dcac59a916ae748591df617966496725fa20da2255b55a0f020baf64216d0206935e548a3d1fd0cf27fdbb6bdcee4fc95d1fe2bcaf2a336de782b149c616c5cf3261", 0xec}], 0x3, &(0x7f0000000ac0)=[@assoc={0x18, 0x117, 0x4, 0x20}, @assoc={0x18, 0x117, 0x4, 0x9c50}, @iv={0x48, 0x117, 0x2, 0x31, "34426126155f179570d6a5548962a6ee2c80eecf0203b57369d002dde1d9b17725253e4035a7712e1d278f90b4b71fcd49"}, @iv={0xc8, 0x117, 0x2, 0xaf, "559315113a78e4009e37289bc90f760df6ae867faf149aed924ff837f6203f426fab1341bc020d991c7972fabe89720ee2d4148f77a9b81e6d01778f9ed6abeebdee806f000b41a5516a7b8a0b77768e0d94bcd6ecad408ec67f69ace392fa90828972cef664a11f943f217a079a9729de67cea3ff3634873659834450452a958b1c9ecb4ba9ef01cebae9057c22cfa0e5896c37b654397b8d9e2403735b9a121b5ad28d42bd657e807929d4ad5fec"}, @assoc={0x18, 0x117, 0x4, 0xfffffffe}, @iv={0xe0, 0x117, 0x2, 0xc9, "82b564fb1a500b001e5a7806c808f3b1c51856808c2a5a1f5e38e0de1b645bbdcba03e094754a46dc2279a4d0ccf942c69573116ec74b6390a9898ee70d61875ea2998dafe2ca20328c139bfd36755cfe4fc6f8284e4e6c401eabc7dccf716b936ec440c534f5f2e345e22bf69b2bf2d8758927200753cd1429002055be9512067c8b17c7cdc08976197411a48a10f8f66cbf0827e63b35f866b2eb0b0dd8255d086d2a1beeda87b739adb77dcc81f19061fa1249b0bc56075d33f24dd94163fbee171b336564e3355"}, @iv={0x60, 0x117, 0x2, 0x49, "6afbc1e8190214af0143dc0dc22229a1acd85be10e67d35df9dd59f68ddd45f4c3d5dd94d2892a7cf8f86c3ec262102c12ef8a51d19b6d6a8d1d9a562e20d437ab6e0ec67afada8939"}], 0x298, 0xa}, {0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000e00)="3b7fed34707359c31b0393e666694d80554a53f441d6afe7fa62e424a04d52562ee4614d4c549afb0af392e8e4e8224c0c0e7717b738e377f2d45647749a462e73a2d44570ebc7be72498035c0f8bb82e25cf4eb0a4bd0fff8783e97343b246c90f7c544118666a67a7d9041e2cf4b13a6ba70660597784fd0d86812aa1c35ad13efcffe51b7d89fb2ab3c3fd603f4705fd331e7aa5130b15756bd3d0993fcbeae2620320216fd895c14", 0xaa}, {&(0x7f0000000ec0)="8fd0a03de6d3e6fd639a062adc1d8878977d546ced9ce3c8bc58ae7c16025136c0779e4f55d4f8e26358b9cdd9f1869204c73f51dae2295b03847281866f0619f5d569f71648bcbcdca5c427a18e29e03507a178ea478de3b47b1a8cbc7fc5ef57b35492269d060f344dea77865b891ffd3aa55f0018f34aae72b0d6250f250e409beaa8a791ccb4f4e5c8e8d475474cdf03", 0x92}, {&(0x7f0000000f80)="2cd290be00eb6ba39a6f9ef426", 0xd}, {&(0x7f0000000fc0)="010d254f072b1a30152073ca400f27501e1b8558589f9424e196c94b289922ca025ddcfff73dbff067badabcce78b6aae2329fc46adfa49fbc65822da01a93d8f0babacf84cfb56be22983e25643d08e0790096abbe37084de16d07b9372fa8069b0340872e6da7c7c581a0e0cada9d4486a2818ac3c15b943e978fa15e108cc730811796d3631d1e78923d77f6446cac96e", 0x92}, {&(0x7f0000001080)="21d9e7df1127b6a0d304b14fb66980e11889c1445077cc2c2bb72b6b16050646a0850fba903e90364b7e86ac6ab6856053766ecbe7994d5190ae89b47a4b04", 0x3f}, {&(0x7f00000010c0)="0c59e4b39cf533129dc37a0376c0613b27f7ab9379cdb985ffd5b2a0eba053d6af4e7022d6195ef80b7f794b315459a816742dd1ad9f62ef76c771817f13232ead167c8ac04a965a7b4460f235405302784982e41ba1567d84184eb177fb023051d94ba2fc09db862ec19a6a823c5cb4fbe631ffc85b14bd681d61a6818ef71936a0a2213f6438a0c57911dbd969b35baf1b1352f4e82469bfc47a379baeec636bbd5e286522b2671a3a4e02a0687c147eccee05aea729d0d7cbc4bfea191fe16d10bd8c1748df37", 0xc8}, {&(0x7f00000011c0)="bf050b96789625e9a524754ef925e452cc66093d2d1929d7e0486d69128a116979a00c717da3983228bbe5a3381b6975260e34dd6a79bf01a810eba0e6828197dea4bdc6fdb992ece87adc470df4c61f7e87e942e8aa2e10a068e2c5cfcdbb928e46b0c7f465d92fa52a7892483f98632dc64ce1", 0x74}], 0x7, &(0x7f00000012c0)=[@iv={0x98, 0x117, 0x2, 0x84, "0232898c7cd7a5ce698aaa8a363679c566a996726e8e0f64e61679129d57c2800649fe0f51cd43963fe4d6a699262ba56e61e8b30152596b6ea7004e6a85262638e3a6be7643b1aeada8272e56136d624e8c88bfe1ff6a3479fdd83d46e45e7a8d0bef6b1ca17a2ed86eddcb25971bf6ded95c4a4cda136c800c1cd1e34e1ba6c93b01c1"}, @op={0x18}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}], 0xe0, 0x4000}, {0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000003680)="dd89024c0b1f0f71510a6a224984afa9655120cd98bc60bc6de637bf89e3d1fe7f9cc5782c26258e4d94250342640d949f7edce6340d347d6ac9b9b9a695070bc6212d294cfb05638cfe0756d6cb1ec5f84ff3668937ba8631d0571f4d02a3e8b1f38524c0e523b48947ba5ec48a7471a144bdfa34b88df06e7f027951185025dd850ee6820f41848b10356c732ff052a04fa8cfbc56f46bd1fad287aa9248d123c8058e64c563be2b0f4006de0ea97e813095150849aab47b1441ecb38ce1020dbb0e647bf18c3357534c182a2ba4d2c55ca544c6495f525e0520186b659e2419", 0xe1}, {&(0x7f0000003780)="037a22aff9c510851272da8592d7658997a5e8ec18580b4654c79cd9b791f9efc1e817009d37edb9431bb949c399e05650bb6caeed28d04b33969228df38d27790dbeb95f837881736ecfb70fc888976f96056184b24b60ecfa0c88c953019e41716cd5aafa44743100db4530398f8d32849c47ebef7040770430de05d6dbfaa343b46625b71eab50ee1b7177a238fe2c3254f0f897ea84193fe3404f98053c0e5b2630a2b40cc409461820a1340d34682387f0e3f585984a45cc473e467bd0e3586c3ff40beb3198a5053133aa9caea2eb582636079bb3c35d52fcfdf6f2b231efc4075c7566f98c569998061ea6533cd2d", 0xf2}], 0x2, &(0x7f00000038c0)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x1018, 0x20008040}, {0x0, 0x0, &(0x7f0000005900)=[{&(0x7f0000004900)="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", 0x1000}], 0x1, 0x0, 0x0, 0x4000}], 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f0000000000)) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, &(0x7f0000000000), 0x244082, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 385.203804] RIP: 0033:0x45f4aa [ 385.206996] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 385.214709] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 385.221990] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 385.229270] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 385.236638] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 385.243922] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:20 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x8, 'bond_slave_0\x00', {'bridge_slave_1\x00'}, 0x7ff}) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 385.390449] FAULT_INJECTION: forcing a failure. [ 385.390449] name failslab, interval 1, probability 0, space 0, times 0 [ 385.406777] CPU: 1 PID: 12872 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 385.414712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.424079] Call Trace: [ 385.426688] dump_stack+0x1b2/0x283 [ 385.430337] should_fail.cold+0x10a/0x154 [ 385.434503] should_failslab+0xd6/0x130 [ 385.438493] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 385.443184] selinux_parse_opts_str+0x48d/0xa00 [ 385.447873] ? debug_object_activate+0x450/0x450 [ 385.452660] ? selinux_key_alloc+0x1a0/0x1a0 [ 385.457095] ? selinux_sb_copy_data+0x206/0x380 [ 385.461788] security_sb_parse_opts_str+0x6e/0xa0 [ 385.466650] parse_security_options+0x49/0x90 [ 385.471160] btrfs_mount+0x502/0x2838 [ 385.474978] ? _find_next_bit+0xdb/0x100 [ 385.479054] ? pcpu_alloc+0x37d/0xf70 [ 385.482869] ? btrfs_remount+0x10c0/0x10c0 [ 385.487147] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 385.492620] ? rcu_read_lock_sched_held+0x10a/0x130 [ 385.497663] ? pcpu_alloc+0xe1/0xf70 [ 385.501396] ? __lockdep_init_map+0x100/0x560 [ 385.505897] ? __lockdep_init_map+0x100/0x560 [ 385.510405] mount_fs+0x92/0x2a0 [ 385.513778] vfs_kern_mount.part.0+0x5b/0x3c0 [ 385.518288] vfs_kern_mount+0x3c/0x60 [ 385.522100] btrfs_mount+0x2a0/0x2838 [ 385.525911] ? _find_next_bit+0xdb/0x100 [ 385.529981] ? pcpu_alloc+0x37d/0xf70 [ 385.533787] ? btrfs_remount+0x10c0/0x10c0 11:08:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000340)=@llc={0x1a, 0x205, 0x2, 0x5, 0x7, 0x0, @remote}, 0x80, &(0x7f0000000140)=[{&(0x7f00000003c0)="f21289ec1eba619857c03e233e9f02118b4a91977fd1d63c3d6ae196b75c0602edf22e0f4b824d7ccf98a2e4330e730d6f7439ad206a29ad55d9beb8fa40938275ea29fce14e6bf9ee8682ddf514171e4ed4e45ae75a4a3d263a2983eb3d230b44a3a83cf9c51acb9855a21533307ed3250949ca13579e7d13401733fadd8312bf7a5802621d6385d2986c79094a040d364d77d7e08795b0f6761f99a6e5e6f071c65e0038ac2052cc7785ed03be4d3b8fda7f4ddb0a59502ffa14abd8ed96e0a5386806196daac65223d6036952175d1d3882c7cda26b9d6008bf8e2f79a374fedb90f1db7ed5bc5a7569b56fafb08f364a4a6f99c4f5", 0xf7}, {&(0x7f00000004c0)="029d2a2f12262366ab01065fb8a44e36533fc6e1dd54913d91b73fd29963d39b297500b7e79caf1c6be9e2386e407a97a1927e21b1f9ed2b7e865d4df58dc0476b4a1e6cca0e5487bd49d5af942f8e64f7bdeb87f49a5d253a3637dc8c4bef2979248a8050ca5b44dea3a1d123e7673d99d6bf3c39917af80e2b454c4b031ea11020c17f107ecb1121b9ba4a39e4addc18ff7f87a9669c191143f88457daf45a3b3afb6905c9b72789d796c0e7568484d4ce", 0xb2}], 0x2, &(0x7f0000001800)=ANY=[@ANYBLOB="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"], 0x1250}, 0x41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) getsockopt$inet_buf(r1, 0x0, 0x2d, &(0x7f0000000000)=""/92, &(0x7f0000000080)=0x5c) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000240)=""/193) socket(0x0, 0x0, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 385.538038] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 385.543497] ? rcu_read_lock_sched_held+0x10a/0x130 [ 385.548525] ? pcpu_alloc+0xe1/0xf70 [ 385.552270] ? pcpu_find_block_fit+0x380/0x380 [ 385.556871] ? __lockdep_init_map+0x100/0x560 [ 385.561386] ? __lockdep_init_map+0x100/0x560 [ 385.565899] mount_fs+0x92/0x2a0 [ 385.569293] vfs_kern_mount.part.0+0x5b/0x3c0 [ 385.573807] do_mount+0x3c9/0x25e0 [ 385.577372] ? copy_mount_string+0x40/0x40 [ 385.581625] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 385.586476] ? copy_mnt_ns+0x8a0/0x8a0 [ 385.590355] ? copy_mount_options+0x1ec/0x2e0 [ 385.594838] ? copy_mnt_ns+0x8a0/0x8a0 [ 385.598709] SyS_mount+0xa8/0x120 [ 385.602147] ? copy_mnt_ns+0x8a0/0x8a0 [ 385.606023] do_syscall_64+0x1d5/0x640 [ 385.609903] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 385.615078] RIP: 0033:0x45f4aa [ 385.618259] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 385.625949] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 385.633207] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 385.640518] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 385.647785] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 385.655202] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:21 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 385.786267] FAULT_INJECTION: forcing a failure. [ 385.786267] name failslab, interval 1, probability 0, space 0, times 0 [ 385.801621] CPU: 0 PID: 12896 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 385.809545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.818912] Call Trace: [ 385.821517] dump_stack+0x1b2/0x283 [ 385.825165] should_fail.cold+0x10a/0x154 [ 385.829341] should_failslab+0xd6/0x130 [ 385.833336] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 385.838021] selinux_parse_opts_str+0x48d/0xa00 [ 385.842699] ? debug_object_activate+0x450/0x450 [ 385.847566] ? selinux_key_alloc+0x1a0/0x1a0 [ 385.852001] ? selinux_sb_copy_data+0x206/0x380 [ 385.856690] security_sb_parse_opts_str+0x6e/0xa0 [ 385.861552] parse_security_options+0x49/0x90 [ 385.866083] btrfs_mount+0x502/0x2838 [ 385.869910] ? _find_next_bit+0xdb/0x100 [ 385.873988] ? pcpu_alloc+0x37d/0xf70 [ 385.877809] ? btrfs_remount+0x10c0/0x10c0 [ 385.882071] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 385.887540] ? rcu_read_lock_sched_held+0x10a/0x130 [ 385.892567] ? pcpu_alloc+0xe1/0xf70 [ 385.896292] ? __lockdep_init_map+0x100/0x560 [ 385.900782] ? __lockdep_init_map+0x100/0x560 [ 385.905277] mount_fs+0x92/0x2a0 [ 385.908646] vfs_kern_mount.part.0+0x5b/0x3c0 [ 385.913242] vfs_kern_mount+0x3c/0x60 [ 385.917034] btrfs_mount+0x2a0/0x2838 [ 385.920826] ? _find_next_bit+0xdb/0x100 [ 385.924883] ? pcpu_alloc+0x37d/0xf70 [ 385.928692] ? btrfs_remount+0x10c0/0x10c0 [ 385.932930] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 385.938375] ? rcu_read_lock_sched_held+0x10a/0x130 [ 385.943382] ? pcpu_alloc+0xe1/0xf70 [ 385.947101] ? pcpu_find_block_fit+0x380/0x380 [ 385.951671] ? __lockdep_init_map+0x100/0x560 [ 385.956156] ? __lockdep_init_map+0x100/0x560 [ 385.960642] mount_fs+0x92/0x2a0 [ 385.964013] vfs_kern_mount.part.0+0x5b/0x3c0 [ 385.968510] do_mount+0x3c9/0x25e0 [ 385.972049] ? copy_mount_string+0x40/0x40 [ 385.976282] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 385.981113] ? copy_mnt_ns+0x8a0/0x8a0 [ 385.984995] ? copy_mount_options+0x1ec/0x2e0 [ 385.989487] ? copy_mnt_ns+0x8a0/0x8a0 [ 385.993367] SyS_mount+0xa8/0x120 [ 385.996807] ? copy_mnt_ns+0x8a0/0x8a0 [ 386.000681] do_syscall_64+0x1d5/0x640 [ 386.004572] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 386.009759] RIP: 0033:0x45f4aa [ 386.012944] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 386.020650] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 386.027909] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 11:08:21 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 386.035165] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 386.042431] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 386.049698] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 386.113229] FAULT_INJECTION: forcing a failure. [ 386.113229] name failslab, interval 1, probability 0, space 0, times 0 [ 386.125343] CPU: 0 PID: 12907 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 386.133366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.142727] Call Trace: [ 386.145312] dump_stack+0x1b2/0x283 [ 386.148927] should_fail.cold+0x10a/0x154 [ 386.153058] should_failslab+0xd6/0x130 [ 386.157020] kmem_cache_alloc_node_trace+0x25a/0x400 [ 386.162108] __kmalloc_node+0x38/0x70 [ 386.165895] kvmalloc_node+0x88/0xd0 [ 386.169591] btrfs_mount+0xea4/0x2838 [ 386.173375] ? _find_next_bit+0xdb/0x100 [ 386.177423] ? pcpu_alloc+0x37d/0xf70 [ 386.181206] ? btrfs_remount+0x10c0/0x10c0 [ 386.185435] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 386.190870] ? rcu_read_lock_sched_held+0x10a/0x130 [ 386.195874] ? pcpu_alloc+0xe1/0xf70 [ 386.199584] ? __lockdep_init_map+0x100/0x560 [ 386.204070] ? __lockdep_init_map+0x100/0x560 [ 386.208567] mount_fs+0x92/0x2a0 [ 386.211919] vfs_kern_mount.part.0+0x5b/0x3c0 [ 386.216419] vfs_kern_mount+0x3c/0x60 [ 386.220215] btrfs_mount+0x2a0/0x2838 [ 386.224009] ? _find_next_bit+0xdb/0x100 [ 386.228065] ? pcpu_alloc+0x37d/0xf70 [ 386.231847] ? btrfs_remount+0x10c0/0x10c0 [ 386.236084] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 386.241526] ? rcu_read_lock_sched_held+0x10a/0x130 [ 386.246639] ? pcpu_alloc+0xe1/0xf70 [ 386.250336] ? pcpu_find_block_fit+0x380/0x380 [ 386.255021] ? __lockdep_init_map+0x100/0x560 [ 386.259505] ? __lockdep_init_map+0x100/0x560 [ 386.263991] mount_fs+0x92/0x2a0 [ 386.267351] vfs_kern_mount.part.0+0x5b/0x3c0 [ 386.271829] do_mount+0x3c9/0x25e0 [ 386.275361] ? copy_mount_string+0x40/0x40 [ 386.279589] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 386.284413] ? copy_mnt_ns+0x8a0/0x8a0 [ 386.288282] ? copy_mount_options+0x1ec/0x2e0 [ 386.292761] ? copy_mnt_ns+0x8a0/0x8a0 [ 386.296659] SyS_mount+0xa8/0x120 [ 386.300103] ? copy_mnt_ns+0x8a0/0x8a0 [ 386.303986] do_syscall_64+0x1d5/0x640 [ 386.307867] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 386.313037] RIP: 0033:0x45f4aa [ 386.316211] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 386.323918] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 386.331183] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 386.338598] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 386.345859] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 386.353112] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 386.366543] BTRFS error (device loop5): superblock checksum mismatch [ 386.413853] BTRFS error (device loop5): open_ctree failed 11:08:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:23 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x4e20, @multicast2}], 0x10) [ 388.004003] FAULT_INJECTION: forcing a failure. [ 388.004003] name failslab, interval 1, probability 0, space 0, times 0 [ 388.019204] CPU: 1 PID: 12926 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 388.027476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.036841] Call Trace: [ 388.039449] dump_stack+0x1b2/0x283 [ 388.043106] should_fail.cold+0x10a/0x154 [ 388.047283] should_failslab+0xd6/0x130 [ 388.051279] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 388.055970] selinux_parse_opts_str+0x4f8/0xa00 [ 388.060655] ? debug_object_activate+0x450/0x450 [ 388.065428] ? selinux_key_alloc+0x1a0/0x1a0 [ 388.069855] ? selinux_sb_copy_data+0x206/0x380 [ 388.074540] security_sb_parse_opts_str+0x6e/0xa0 [ 388.079397] parse_security_options+0x49/0x90 [ 388.083901] btrfs_mount+0x502/0x2838 [ 388.087838] ? _find_next_bit+0xdb/0x100 [ 388.091914] ? pcpu_alloc+0x37d/0xf70 [ 388.095726] ? btrfs_remount+0x10c0/0x10c0 [ 388.099986] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 388.105450] ? rcu_read_lock_sched_held+0x10a/0x130 [ 388.110478] ? pcpu_alloc+0xe1/0xf70 [ 388.114210] ? __lockdep_init_map+0x100/0x560 [ 388.118718] ? __lockdep_init_map+0x100/0x560 [ 388.123222] mount_fs+0x92/0x2a0 [ 388.126606] vfs_kern_mount.part.0+0x5b/0x3c0 [ 388.131205] vfs_kern_mount+0x3c/0x60 [ 388.135137] btrfs_mount+0x2a0/0x2838 [ 388.138966] ? _find_next_bit+0xdb/0x100 [ 388.143042] ? pcpu_alloc+0x37d/0xf70 [ 388.146854] ? btrfs_remount+0x10c0/0x10c0 [ 388.151105] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 388.156569] ? rcu_read_lock_sched_held+0x10a/0x130 [ 388.161594] ? pcpu_alloc+0xe1/0xf70 [ 388.165322] ? pcpu_find_block_fit+0x380/0x380 [ 388.169910] ? __lockdep_init_map+0x100/0x560 [ 388.174416] ? __lockdep_init_map+0x100/0x560 [ 388.178925] mount_fs+0x92/0x2a0 [ 388.182311] vfs_kern_mount.part.0+0x5b/0x3c0 [ 388.186833] do_mount+0x3c9/0x25e0 [ 388.190386] ? copy_mount_string+0x40/0x40 [ 388.194637] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 388.199487] ? copy_mnt_ns+0x8a0/0x8a0 [ 388.203376] ? copy_mount_options+0x1ec/0x2e0 [ 388.207869] ? copy_mnt_ns+0x8a0/0x8a0 [ 388.211747] SyS_mount+0xa8/0x120 [ 388.215190] ? copy_mnt_ns+0x8a0/0x8a0 [ 388.219066] do_syscall_64+0x1d5/0x640 [ 388.222945] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 388.228120] RIP: 0033:0x45f4aa [ 388.231292] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 388.238987] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 388.246243] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 11:08:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 388.253504] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 388.260759] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 388.268016] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:23 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 388.407987] FAULT_INJECTION: forcing a failure. [ 388.407987] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 388.442862] CPU: 1 PID: 12958 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 388.450796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.460160] Call Trace: [ 388.462771] dump_stack+0x1b2/0x283 [ 388.466418] should_fail.cold+0x10a/0x154 [ 388.470584] __alloc_pages_nodemask+0x22b/0x2730 [ 388.475357] ? lock_acquire+0x170/0x3f0 [ 388.479355] ? trace_hardirqs_on+0x10/0x10 [ 388.483596] ? trace_hardirqs_on+0x10/0x10 [ 388.487835] ? blkdev_get+0x46f/0x8a0 [ 388.491648] ? __mutex_lock+0x2cb/0x1430 [ 388.495717] ? __mutex_unlock_slowpath+0x75/0x780 [ 388.500572] ? blkdev_get+0x537/0x8a0 [ 388.504379] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 388.509224] ? lock_downgrade+0x6e0/0x6e0 [ 388.513383] ? __radix_tree_lookup+0x19f/0x2d0 [ 388.517983] ? find_get_entry+0x31b/0x660 [ 388.522140] ? lock_downgrade+0x6e0/0x6e0 [ 388.526286] alloc_pages_current+0xe7/0x1e0 [ 388.530595] __page_cache_alloc+0x243/0x3c0 [ 388.534903] do_read_cache_page+0x316/0xc10 [ 388.539214] ? blkdev_writepages+0xd0/0xd0 [ 388.543518] btrfs_read_disk_super+0xd0/0x370 [ 388.548046] btrfs_scan_one_device+0xb5/0x330 [ 388.552531] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 388.557534] ? device_list_add+0x8f0/0x8f0 [ 388.561756] btrfs_mount+0x528/0x2838 [ 388.565563] ? _find_next_bit+0xdb/0x100 [ 388.569643] ? pcpu_alloc+0x37d/0xf70 [ 388.573462] ? btrfs_remount+0x10c0/0x10c0 [ 388.577721] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 388.583185] ? rcu_read_lock_sched_held+0x10a/0x130 [ 388.588211] ? pcpu_alloc+0xe1/0xf70 [ 388.591968] ? __lockdep_init_map+0x100/0x560 [ 388.596478] ? __lockdep_init_map+0x100/0x560 [ 388.600988] mount_fs+0x92/0x2a0 [ 388.604360] vfs_kern_mount.part.0+0x5b/0x3c0 [ 388.608859] vfs_kern_mount+0x3c/0x60 [ 388.612691] btrfs_mount+0x2a0/0x2838 [ 388.616508] ? _find_next_bit+0xdb/0x100 [ 388.620579] ? pcpu_alloc+0x37d/0xf70 [ 388.624387] ? btrfs_remount+0x10c0/0x10c0 [ 388.628641] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 388.634096] ? rcu_read_lock_sched_held+0x10a/0x130 [ 388.639106] ? pcpu_alloc+0xe1/0xf70 [ 388.642812] ? pcpu_find_block_fit+0x380/0x380 [ 388.647386] ? __lockdep_init_map+0x100/0x560 [ 388.651867] ? __lockdep_init_map+0x100/0x560 [ 388.656352] mount_fs+0x92/0x2a0 [ 388.659704] vfs_kern_mount.part.0+0x5b/0x3c0 [ 388.664190] do_mount+0x3c9/0x25e0 [ 388.667714] ? copy_mount_string+0x40/0x40 [ 388.671942] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 388.676772] ? copy_mnt_ns+0x8a0/0x8a0 [ 388.680646] ? copy_mount_options+0x1ec/0x2e0 [ 388.685124] ? copy_mnt_ns+0x8a0/0x8a0 [ 388.689001] SyS_mount+0xa8/0x120 [ 388.692439] ? copy_mnt_ns+0x8a0/0x8a0 [ 388.696323] do_syscall_64+0x1d5/0x640 [ 388.700212] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 388.705393] RIP: 0033:0x45f4aa 11:08:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2}, 0x1, 0x2, 0x0, 0x9, 0x200, 0xbb8d}, 0x0, 0x0, 0xffffffffffffffff, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)=0x612d) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) r2 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xceff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYRESHEX=r2, @ANYRES16=r3, @ANYBLOB="3257e906039d7b56a34a204e98f3bc633fc5e65a01d65f891fdb1067ec324d75f1ccca39404b79fed7011b605b442c998804000000000000003bedb5d1882c4c09441bb6c3c30566327d21454ad7b689c5eb02", @ANYRES32, @ANYBLOB="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"], 0x7}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x138, r3, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x138}, 0x1, 0x0, 0x0, 0x24000080}, 0x404c880) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) r4 = socket(0x2b, 0x2, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0xa3, 0x3, 0xff, "b4abbab4f75c73c7fe3f57fec0fc7911", "bba89017f1f8c6c475bec5196cd579866f8090c5186642ae20513a05c88e32c98362ba94f16b7f6c6d70170fb03b612c893e46f52dcedc2873427654bb1da8377b6ea242fa9e5c07ded8ea4445c1e578276b371721c319ec0839dc414e64929cf010fa017e8c3b52f66cdadd99fd7965caf536ff75f1755c8041c2fcff43ec05b9542a02508d23cd943c38e77aea"}, 0xa3, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 388.708564] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 388.716257] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 388.723510] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 388.730764] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 388.738016] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 388.745273] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:24 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 388.839626] FAULT_INJECTION: forcing a failure. [ 388.839626] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 388.851669] CPU: 0 PID: 12973 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 388.859560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.868923] Call Trace: [ 388.871530] dump_stack+0x1b2/0x283 [ 388.875184] should_fail.cold+0x10a/0x154 [ 388.879354] __alloc_pages_nodemask+0x22b/0x2730 [ 388.884124] ? lock_acquire+0x170/0x3f0 [ 388.888108] ? trace_hardirqs_on+0x10/0x10 [ 388.892356] ? trace_hardirqs_on+0x10/0x10 [ 388.896604] ? blkdev_get+0x46f/0x8a0 [ 388.900416] ? __mutex_lock+0x2cb/0x1430 [ 388.904476] ? __mutex_unlock_slowpath+0x75/0x780 [ 388.909315] ? blkdev_get+0x537/0x8a0 [ 388.913109] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 388.917960] ? lock_downgrade+0x6e0/0x6e0 [ 388.922095] ? __radix_tree_lookup+0x19f/0x2d0 [ 388.926749] ? find_get_entry+0x31b/0x660 [ 388.930888] ? lock_downgrade+0x6e0/0x6e0 [ 388.935035] alloc_pages_current+0xe7/0x1e0 [ 388.939347] __page_cache_alloc+0x243/0x3c0 [ 388.943659] do_read_cache_page+0x316/0xc10 [ 388.947970] ? blkdev_writepages+0xd0/0xd0 [ 388.952199] btrfs_read_disk_super+0xd0/0x370 [ 388.956683] btrfs_scan_one_device+0xb5/0x330 [ 388.961195] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 388.966197] ? device_list_add+0x8f0/0x8f0 [ 388.970427] btrfs_mount+0x528/0x2838 [ 388.974226] ? _find_next_bit+0xdb/0x100 [ 388.978278] ? pcpu_alloc+0x37d/0xf70 [ 388.982072] ? btrfs_remount+0x10c0/0x10c0 [ 388.986301] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 388.991741] ? rcu_read_lock_sched_held+0x10a/0x130 [ 388.996857] ? pcpu_alloc+0xe1/0xf70 [ 389.000596] ? __lockdep_init_map+0x100/0x560 [ 389.005082] ? __lockdep_init_map+0x100/0x560 [ 389.009567] mount_fs+0x92/0x2a0 [ 389.012925] vfs_kern_mount.part.0+0x5b/0x3c0 [ 389.017414] vfs_kern_mount+0x3c/0x60 [ 389.021212] btrfs_mount+0x2a0/0x2838 [ 389.025009] ? _find_next_bit+0xdb/0x100 [ 389.029060] ? pcpu_alloc+0x37d/0xf70 [ 389.032850] ? btrfs_remount+0x10c0/0x10c0 [ 389.037079] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 389.042521] ? rcu_read_lock_sched_held+0x10a/0x130 [ 389.047539] ? pcpu_alloc+0xe1/0xf70 [ 389.051255] ? pcpu_find_block_fit+0x380/0x380 [ 389.055831] ? __lockdep_init_map+0x100/0x560 [ 389.060314] ? __lockdep_init_map+0x100/0x560 [ 389.064798] mount_fs+0x92/0x2a0 [ 389.068158] vfs_kern_mount.part.0+0x5b/0x3c0 [ 389.072650] do_mount+0x3c9/0x25e0 [ 389.076187] ? copy_mount_string+0x40/0x40 [ 389.080413] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 389.085250] ? copy_mnt_ns+0x8a0/0x8a0 [ 389.089128] ? copy_mount_options+0x1ec/0x2e0 [ 389.093612] ? copy_mnt_ns+0x8a0/0x8a0 [ 389.097486] SyS_mount+0xa8/0x120 [ 389.100930] ? copy_mnt_ns+0x8a0/0x8a0 [ 389.104811] do_syscall_64+0x1d5/0x640 [ 389.108696] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 389.113875] RIP: 0033:0x45f4aa [ 389.117049] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 389.124751] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 389.132031] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 389.139292] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 389.146549] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 389.153808] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:24 executing program 5 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 389.369456] FAULT_INJECTION: forcing a failure. [ 389.369456] name failslab, interval 1, probability 0, space 0, times 0 [ 389.380984] CPU: 1 PID: 12992 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 389.388852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.398197] Call Trace: [ 389.400773] dump_stack+0x1b2/0x283 [ 389.404387] should_fail.cold+0x10a/0x154 [ 389.408521] should_failslab+0xd6/0x130 [ 389.412478] kmem_cache_alloc+0x40/0x3c0 [ 389.416527] radix_tree_node_alloc.constprop.0+0x1b4/0x300 [ 389.422139] __radix_tree_create+0x32b/0x4b0 [ 389.426532] ? check_preemption_disabled+0x35/0x240 [ 389.431537] page_cache_tree_insert+0x98/0x2a0 [ 389.436111] ? file_check_and_advance_wb_err+0x370/0x370 [ 389.441557] ? __add_to_page_cache_locked+0x22a/0x890 [ 389.446735] __add_to_page_cache_locked+0x23a/0x890 [ 389.451741] ? page_cache_tree_insert+0x2a0/0x2a0 [ 389.456573] add_to_page_cache_lru+0xea/0x300 [ 389.461056] ? add_to_page_cache_locked+0x40/0x40 [ 389.465883] ? __page_cache_alloc+0xd7/0x3c0 [ 389.470276] do_read_cache_page+0x338/0xc10 [ 389.474584] ? blkdev_writepages+0xd0/0xd0 [ 389.478813] btrfs_read_disk_super+0xd0/0x370 [ 389.483291] btrfs_scan_one_device+0xb5/0x330 [ 389.487874] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 389.492871] ? device_list_add+0x8f0/0x8f0 [ 389.497099] btrfs_mount+0x528/0x2838 [ 389.500885] ? _find_next_bit+0xdb/0x100 [ 389.504932] ? pcpu_alloc+0x37d/0xf70 [ 389.508713] ? btrfs_remount+0x10c0/0x10c0 [ 389.512936] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 389.518372] ? rcu_read_lock_sched_held+0x10a/0x130 [ 389.523375] ? pcpu_alloc+0xe1/0xf70 [ 389.527077] ? __lockdep_init_map+0x100/0x560 [ 389.531556] ? __lockdep_init_map+0x100/0x560 [ 389.536093] mount_fs+0x92/0x2a0 [ 389.539449] vfs_kern_mount.part.0+0x5b/0x3c0 [ 389.543928] vfs_kern_mount+0x3c/0x60 [ 389.547713] btrfs_mount+0x2a0/0x2838 [ 389.551499] ? _find_next_bit+0xdb/0x100 [ 389.555543] ? pcpu_alloc+0x37d/0xf70 [ 389.559326] ? btrfs_remount+0x10c0/0x10c0 [ 389.563551] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 389.568983] ? rcu_read_lock_sched_held+0x10a/0x130 [ 389.573986] ? pcpu_alloc+0xe1/0xf70 [ 389.577727] ? pcpu_find_block_fit+0x380/0x380 [ 389.582314] ? __lockdep_init_map+0x100/0x560 [ 389.586803] ? __lockdep_init_map+0x100/0x560 [ 389.591286] mount_fs+0x92/0x2a0 [ 389.594666] vfs_kern_mount.part.0+0x5b/0x3c0 [ 389.599369] do_mount+0x3c9/0x25e0 [ 389.603036] ? copy_mount_string+0x40/0x40 [ 389.607258] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 389.612086] ? copy_mnt_ns+0x8a0/0x8a0 [ 389.615958] ? copy_mount_options+0x1ec/0x2e0 [ 389.620437] ? copy_mnt_ns+0x8a0/0x8a0 [ 389.624309] SyS_mount+0xa8/0x120 [ 389.627743] ? copy_mnt_ns+0x8a0/0x8a0 [ 389.631618] do_syscall_64+0x1d5/0x640 [ 389.635498] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 389.640689] RIP: 0033:0x45f4aa [ 389.643872] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 389.651569] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 389.658822] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 389.666074] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 389.673329] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 389.680583] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 389.700268] BTRFS error (device loop5): superblock checksum mismatch [ 389.754992] BTRFS error (device loop5): open_ctree failed [ 390.823926] NOHZ: local_softirq_pending 08 11:08:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:26 executing program 5 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x80400) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 390.995409] FAULT_INJECTION: forcing a failure. [ 390.995409] name failslab, interval 1, probability 0, space 0, times 0 [ 391.006926] CPU: 0 PID: 13011 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 391.014836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.024212] Call Trace: [ 391.026824] dump_stack+0x1b2/0x283 [ 391.030474] should_fail.cold+0x10a/0x154 [ 391.034642] should_failslab+0xd6/0x130 [ 391.038633] kmem_cache_alloc+0x28e/0x3c0 [ 391.042794] alloc_buffer_head+0x20/0xd0 [ 391.046871] alloc_page_buffers+0xb3/0x1f0 [ 391.051141] create_empty_buffers+0x36/0x470 [ 391.055690] ? mem_cgroup_commit_charge+0x17d/0x3a0 [ 391.060730] create_page_buffers+0x14d/0x1c0 [ 391.065161] block_read_full_page+0xb9/0x8f0 [ 391.069591] ? __add_to_page_cache_locked+0x328/0x890 [ 391.074805] ? check_preemption_disabled+0x35/0x240 [ 391.079858] ? set_init_blocksize+0x210/0x210 [ 391.084375] ? __lru_cache_add+0x17b/0x250 [ 391.088624] ? __bread_gfp+0x1f0/0x1f0 [ 391.092528] ? add_to_page_cache_lru+0x151/0x300 [ 391.097297] ? add_to_page_cache_locked+0x40/0x40 [ 391.102162] ? __page_cache_alloc+0xd7/0x3c0 [ 391.106578] do_read_cache_page+0x354/0xc10 [ 391.110919] ? blkdev_writepages+0xd0/0xd0 [ 391.115190] btrfs_read_disk_super+0xd0/0x370 [ 391.119690] btrfs_scan_one_device+0xb5/0x330 [ 391.124180] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 391.129184] ? device_list_add+0x8f0/0x8f0 [ 391.133429] btrfs_mount+0x528/0x2838 [ 391.137238] ? _find_next_bit+0xdb/0x100 [ 391.141287] ? pcpu_alloc+0x37d/0xf70 [ 391.145082] ? btrfs_remount+0x10c0/0x10c0 [ 391.149309] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 391.154747] ? rcu_read_lock_sched_held+0x10a/0x130 [ 391.159753] ? pcpu_alloc+0xe1/0xf70 [ 391.163461] ? __lockdep_init_map+0x100/0x560 [ 391.167949] ? __lockdep_init_map+0x100/0x560 [ 391.172432] mount_fs+0x92/0x2a0 [ 391.175791] vfs_kern_mount.part.0+0x5b/0x3c0 [ 391.180346] vfs_kern_mount+0x3c/0x60 [ 391.184146] btrfs_mount+0x2a0/0x2838 [ 391.187942] ? _find_next_bit+0xdb/0x100 [ 391.191993] ? pcpu_alloc+0x37d/0xf70 [ 391.195781] ? btrfs_remount+0x10c0/0x10c0 [ 391.200009] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 391.205451] ? rcu_read_lock_sched_held+0x10a/0x130 [ 391.210459] ? pcpu_alloc+0xe1/0xf70 [ 391.214174] ? pcpu_find_block_fit+0x380/0x380 [ 391.218756] ? __lockdep_init_map+0x100/0x560 [ 391.223375] ? __lockdep_init_map+0x100/0x560 [ 391.227871] mount_fs+0x92/0x2a0 [ 391.231228] vfs_kern_mount.part.0+0x5b/0x3c0 [ 391.235712] do_mount+0x3c9/0x25e0 [ 391.239243] ? copy_mount_string+0x40/0x40 [ 391.243468] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 391.248298] ? copy_mnt_ns+0x8a0/0x8a0 [ 391.252179] ? copy_mount_options+0x1ec/0x2e0 [ 391.256677] ? copy_mnt_ns+0x8a0/0x8a0 [ 391.260662] SyS_mount+0xa8/0x120 [ 391.264177] ? copy_mnt_ns+0x8a0/0x8a0 [ 391.268056] do_syscall_64+0x1d5/0x640 [ 391.271936] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 391.277110] RIP: 0033:0x45f4aa [ 391.280283] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 391.287979] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa 11:08:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 391.295336] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 391.302593] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 391.309864] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 391.317148] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 391.421362] BTRFS error (device loop5): superblock checksum mismatch 11:08:26 executing program 5 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 391.464444] BTRFS error (device loop5): open_ctree failed [ 391.549496] FAULT_INJECTION: forcing a failure. [ 391.549496] name failslab, interval 1, probability 0, space 0, times 0 [ 391.561229] CPU: 1 PID: 13043 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 391.569109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.578473] Call Trace: [ 391.581055] dump_stack+0x1b2/0x283 [ 391.584676] should_fail.cold+0x10a/0x154 [ 391.588921] ? mempool_free+0x1d0/0x1d0 [ 391.592886] should_failslab+0xd6/0x130 [ 391.596849] kmem_cache_alloc+0x40/0x3c0 [ 391.600901] ? mempool_free+0x1d0/0x1d0 [ 391.604862] mempool_alloc+0x111/0x2d0 [ 391.608745] ? remove_element.isra.0+0x1b0/0x1b0 [ 391.613487] ? check_preemption_disabled+0x35/0x240 [ 391.618562] bio_alloc_bioset+0x352/0x640 [ 391.622702] ? bvec_alloc+0x2d0/0x2d0 [ 391.626493] ? lock_downgrade+0x6e0/0x6e0 [ 391.630634] submit_bh_wbc+0xf5/0x6f0 [ 391.634427] block_read_full_page+0x71f/0x8f0 [ 391.638931] ? set_init_blocksize+0x210/0x210 [ 391.643435] ? __lru_cache_add+0x17b/0x250 [ 391.647668] ? __bread_gfp+0x1f0/0x1f0 [ 391.651542] ? add_to_page_cache_lru+0x151/0x300 [ 391.656282] ? add_to_page_cache_locked+0x40/0x40 [ 391.661112] ? __page_cache_alloc+0xd7/0x3c0 [ 391.665509] do_read_cache_page+0x354/0xc10 [ 391.669816] ? blkdev_writepages+0xd0/0xd0 [ 391.674043] btrfs_read_disk_super+0xd0/0x370 [ 391.678530] btrfs_scan_one_device+0xb5/0x330 [ 391.683014] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 391.688014] ? device_list_add+0x8f0/0x8f0 [ 391.692250] btrfs_mount+0x528/0x2838 [ 391.696051] ? _find_next_bit+0xdb/0x100 [ 391.700109] ? pcpu_alloc+0x37d/0xf70 [ 391.703908] ? btrfs_remount+0x10c0/0x10c0 [ 391.708132] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 391.713571] ? rcu_read_lock_sched_held+0x10a/0x130 [ 391.718571] ? pcpu_alloc+0xe1/0xf70 [ 391.722287] ? __lockdep_init_map+0x100/0x560 [ 391.726785] ? __lockdep_init_map+0x100/0x560 [ 391.731284] mount_fs+0x92/0x2a0 [ 391.734656] vfs_kern_mount.part.0+0x5b/0x3c0 [ 391.739141] vfs_kern_mount+0x3c/0x60 [ 391.742930] btrfs_mount+0x2a0/0x2838 [ 391.746833] ? _find_next_bit+0xdb/0x100 [ 391.750892] ? pcpu_alloc+0x37d/0xf70 [ 391.754692] ? btrfs_remount+0x10c0/0x10c0 [ 391.758929] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 391.764374] ? rcu_read_lock_sched_held+0x10a/0x130 [ 391.769376] ? pcpu_alloc+0xe1/0xf70 [ 391.773078] ? pcpu_find_block_fit+0x380/0x380 [ 391.777648] ? __lockdep_init_map+0x100/0x560 [ 391.782135] ? __lockdep_init_map+0x100/0x560 [ 391.786621] mount_fs+0x92/0x2a0 [ 391.789978] vfs_kern_mount.part.0+0x5b/0x3c0 [ 391.794464] do_mount+0x3c9/0x25e0 [ 391.798004] ? copy_mount_string+0x40/0x40 [ 391.802236] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 391.807066] ? copy_mnt_ns+0x8a0/0x8a0 [ 391.810940] ? copy_mount_options+0x1ec/0x2e0 [ 391.815432] ? copy_mnt_ns+0x8a0/0x8a0 [ 391.819311] SyS_mount+0xa8/0x120 [ 391.822750] ? copy_mnt_ns+0x8a0/0x8a0 [ 391.826624] do_syscall_64+0x1d5/0x640 [ 391.830501] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 391.835678] RIP: 0033:0x45f4aa [ 391.838860] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 391.846555] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 391.853838] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 391.861093] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 391.868349] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 391.875607] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 391.907884] BTRFS error (device loop5): superblock checksum mismatch 11:08:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x0, 0x0, 0x6}, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000080)={0xc4b, {0x0, 0x6, 0x7f, 0x5a53, 0x4, 0x4}}) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x7fe00, 0x7, 0x4, 0x8}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x400086) sendto$rose(r4, &(0x7f0000000240)="3f5c30b4ebe9ebbad2218a66b4594a47dc2e0ce2ad839014ada6c7071964140045fc187433b89e88a87ec319dfa02bfeb793963e7ebdd31a210f40b159378bc2bc27fc0bcb72377355a32a8d502010cf85e538db0c1f3c90962fc6342d5fcce8dd0fc4b5dbb0668e8baab691ed62d0de3789a8", 0x73, 0x8000, &(0x7f00000001c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @default}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 391.955185] BTRFS error (device loop5): open_ctree failed 11:08:27 executing program 5 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 392.067777] FAULT_INJECTION: forcing a failure. [ 392.067777] name failslab, interval 1, probability 0, space 0, times 0 [ 392.093410] CPU: 0 PID: 13062 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 392.101336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.110703] Call Trace: [ 392.113309] dump_stack+0x1b2/0x283 [ 392.116963] should_fail.cold+0x10a/0x154 [ 392.121116] should_failslab+0xd6/0x130 [ 392.125083] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 392.129747] btrfs_mount+0xf1e/0x2838 [ 392.133551] ? _find_next_bit+0xdb/0x100 [ 392.137740] ? pcpu_alloc+0x37d/0xf70 [ 392.141541] ? btrfs_remount+0x10c0/0x10c0 [ 392.145781] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 392.151220] ? rcu_read_lock_sched_held+0x10a/0x130 [ 392.156231] ? pcpu_alloc+0xe1/0xf70 [ 392.159936] ? __lockdep_init_map+0x100/0x560 [ 392.164416] ? __lockdep_init_map+0x100/0x560 [ 392.168901] mount_fs+0x92/0x2a0 [ 392.172258] vfs_kern_mount.part.0+0x5b/0x3c0 [ 392.176744] vfs_kern_mount+0x3c/0x60 [ 392.180533] btrfs_mount+0x2a0/0x2838 [ 392.184340] ? _find_next_bit+0xdb/0x100 [ 392.188388] ? pcpu_alloc+0x37d/0xf70 [ 392.192173] ? btrfs_remount+0x10c0/0x10c0 [ 392.196398] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 392.201839] ? rcu_read_lock_sched_held+0x10a/0x130 [ 392.206844] ? pcpu_alloc+0xe1/0xf70 [ 392.210564] ? pcpu_find_block_fit+0x380/0x380 [ 392.215137] ? __lockdep_init_map+0x100/0x560 [ 392.219618] ? __lockdep_init_map+0x100/0x560 [ 392.224099] mount_fs+0x92/0x2a0 [ 392.227453] vfs_kern_mount.part.0+0x5b/0x3c0 [ 392.231931] do_mount+0x3c9/0x25e0 [ 392.235456] ? copy_mount_string+0x40/0x40 [ 392.239682] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 392.244508] ? copy_mnt_ns+0x8a0/0x8a0 [ 392.248390] ? copy_mount_options+0x1ec/0x2e0 [ 392.252887] ? copy_mnt_ns+0x8a0/0x8a0 [ 392.256768] SyS_mount+0xa8/0x120 [ 392.260204] ? copy_mnt_ns+0x8a0/0x8a0 [ 392.264083] do_syscall_64+0x1d5/0x640 [ 392.267982] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 392.273276] RIP: 0033:0x45f4aa [ 392.276452] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 392.284156] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 392.291413] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 392.298672] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 392.305934] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 392.313225] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:27 executing program 5 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:27 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x4, 0x1, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000000)={0x9, {{0xa, 0x4e20, 0x1, @private1={0xfc, 0x1, [], 0x1}}}}, 0x88) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 392.396974] FAULT_INJECTION: forcing a failure. [ 392.396974] name failslab, interval 1, probability 0, space 0, times 0 [ 392.408202] CPU: 0 PID: 13075 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 392.416070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.425411] Call Trace: [ 392.427993] dump_stack+0x1b2/0x283 [ 392.431604] should_fail.cold+0x10a/0x154 [ 392.435742] should_failslab+0xd6/0x130 [ 392.439698] kmem_cache_alloc+0x40/0x3c0 [ 392.443745] radix_tree_node_alloc.constprop.0+0x1b4/0x300 [ 392.449351] __radix_tree_create+0x32b/0x4b0 [ 392.453747] ? check_preemption_disabled+0x35/0x240 [ 392.458749] page_cache_tree_insert+0x98/0x2a0 [ 392.463315] ? file_check_and_advance_wb_err+0x370/0x370 [ 392.468748] ? __add_to_page_cache_locked+0x22a/0x890 [ 392.473924] __add_to_page_cache_locked+0x23a/0x890 [ 392.478930] ? page_cache_tree_insert+0x2a0/0x2a0 [ 392.483760] ? lock_downgrade+0x6e0/0x6e0 [ 392.487899] add_to_page_cache_lru+0xea/0x300 [ 392.492380] ? add_to_page_cache_locked+0x40/0x40 [ 392.497207] ? __page_cache_alloc+0xd7/0x3c0 [ 392.501603] pagecache_get_page+0x2bb/0xa10 [ 392.505931] __getblk_gfp+0x234/0x7b0 [ 392.509722] ? __mutex_unlock_slowpath+0x75/0x780 [ 392.514549] __bread_gfp+0x29/0x1f0 [ 392.518235] btrfs_read_dev_one_super+0x98/0x260 [ 392.522980] btrfs_read_dev_super+0x5a/0xa0 [ 392.527290] ? btrfs_read_dev_one_super+0x260/0x260 [ 392.532301] btrfs_get_bdev_and_sb+0xd7/0x2d0 [ 392.536791] __btrfs_open_devices+0x175/0xa40 [ 392.541277] ? find_device+0x100/0x100 [ 392.545152] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 392.550598] btrfs_open_devices+0x98/0xb0 [ 392.554737] btrfs_mount+0x10a2/0x2838 [ 392.558617] ? _find_next_bit+0xdb/0x100 [ 392.562668] ? pcpu_alloc+0x37d/0xf70 [ 392.566449] ? btrfs_remount+0x10c0/0x10c0 [ 392.570672] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 392.576107] ? rcu_read_lock_sched_held+0x10a/0x130 [ 392.581109] ? pcpu_alloc+0xe1/0xf70 [ 392.584827] ? __lockdep_init_map+0x100/0x560 [ 392.589309] ? __lockdep_init_map+0x100/0x560 [ 392.593795] mount_fs+0x92/0x2a0 [ 392.597148] vfs_kern_mount.part.0+0x5b/0x3c0 [ 392.601627] vfs_kern_mount+0x3c/0x60 [ 392.605413] btrfs_mount+0x2a0/0x2838 [ 392.609200] ? _find_next_bit+0xdb/0x100 [ 392.613246] ? pcpu_alloc+0x37d/0xf70 [ 392.617030] ? btrfs_remount+0x10c0/0x10c0 [ 392.621250] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 392.626684] ? rcu_read_lock_sched_held+0x10a/0x130 [ 392.631684] ? pcpu_alloc+0xe1/0xf70 [ 392.635387] ? pcpu_find_block_fit+0x380/0x380 [ 392.639954] ? __lockdep_init_map+0x100/0x560 [ 392.644450] ? __lockdep_init_map+0x100/0x560 [ 392.648927] mount_fs+0x92/0x2a0 [ 392.652278] vfs_kern_mount.part.0+0x5b/0x3c0 [ 392.656759] do_mount+0x3c9/0x25e0 [ 392.660288] ? copy_mount_string+0x40/0x40 [ 392.664501] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 392.669325] ? copy_mnt_ns+0x8a0/0x8a0 [ 392.673197] ? copy_mount_options+0x1ec/0x2e0 [ 392.677679] ? copy_mnt_ns+0x8a0/0x8a0 [ 392.681548] SyS_mount+0xa8/0x120 [ 392.684979] ? copy_mnt_ns+0x8a0/0x8a0 [ 392.688848] do_syscall_64+0x1d5/0x640 [ 392.692722] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 392.697951] RIP: 0033:0x45f4aa [ 392.701118] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 392.708807] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 392.716056] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 392.723308] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 392.730584] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 392.737838] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 392.760455] BTRFS error (device loop5): superblock checksum mismatch 11:08:28 executing program 5 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 392.807733] BTRFS error (device loop5): open_ctree failed [ 392.909142] FAULT_INJECTION: forcing a failure. [ 392.909142] name failslab, interval 1, probability 0, space 0, times 0 [ 392.927625] CPU: 1 PID: 13091 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 392.935551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.944913] Call Trace: [ 392.947518] dump_stack+0x1b2/0x283 [ 392.951164] should_fail.cold+0x10a/0x154 [ 392.955323] should_failslab+0xd6/0x130 [ 392.959303] kmem_cache_alloc+0x28e/0x3c0 [ 392.963469] alloc_buffer_head+0x20/0xd0 [ 392.967533] alloc_page_buffers+0xb3/0x1f0 [ 392.971790] __getblk_gfp+0x32c/0x7b0 [ 392.975601] ? __mutex_unlock_slowpath+0x75/0x780 [ 392.980454] __bread_gfp+0x29/0x1f0 [ 392.984090] btrfs_read_dev_one_super+0x98/0x260 [ 392.988854] btrfs_read_dev_super+0x5a/0xa0 [ 392.993176] ? btrfs_read_dev_one_super+0x260/0x260 [ 392.998202] btrfs_get_bdev_and_sb+0xd7/0x2d0 [ 393.002735] __btrfs_open_devices+0x175/0xa40 [ 393.007263] ? find_device+0x100/0x100 [ 393.011173] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 393.016645] btrfs_open_devices+0x98/0xb0 [ 393.020811] btrfs_mount+0x10a2/0x2838 [ 393.024715] ? _find_next_bit+0xdb/0x100 [ 393.028790] ? pcpu_alloc+0x37d/0xf70 [ 393.032607] ? btrfs_remount+0x10c0/0x10c0 [ 393.036868] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 393.042337] ? rcu_read_lock_sched_held+0x10a/0x130 [ 393.047372] ? pcpu_alloc+0xe1/0xf70 [ 393.051100] ? __lockdep_init_map+0x100/0x560 [ 393.055583] ? __lockdep_init_map+0x100/0x560 [ 393.060070] mount_fs+0x92/0x2a0 [ 393.063545] vfs_kern_mount.part.0+0x5b/0x3c0 [ 393.068041] vfs_kern_mount+0x3c/0x60 [ 393.071837] btrfs_mount+0x2a0/0x2838 [ 393.075760] ? _find_next_bit+0xdb/0x100 [ 393.079809] ? pcpu_alloc+0x37d/0xf70 [ 393.083606] ? btrfs_remount+0x10c0/0x10c0 [ 393.087978] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 393.093415] ? rcu_read_lock_sched_held+0x10a/0x130 [ 393.098419] ? pcpu_alloc+0xe1/0xf70 [ 393.102119] ? pcpu_find_block_fit+0x380/0x380 [ 393.106792] ? __lockdep_init_map+0x100/0x560 [ 393.111273] ? __lockdep_init_map+0x100/0x560 [ 393.115769] mount_fs+0x92/0x2a0 [ 393.119190] vfs_kern_mount.part.0+0x5b/0x3c0 [ 393.123686] do_mount+0x3c9/0x25e0 [ 393.127224] ? copy_mount_string+0x40/0x40 [ 393.131445] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 393.136275] ? copy_mnt_ns+0x8a0/0x8a0 [ 393.140148] ? copy_mount_options+0x1ec/0x2e0 [ 393.144629] ? copy_mnt_ns+0x8a0/0x8a0 [ 393.148522] SyS_mount+0xa8/0x120 [ 393.151964] ? copy_mnt_ns+0x8a0/0x8a0 [ 393.155855] do_syscall_64+0x1d5/0x640 [ 393.159748] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 393.164934] RIP: 0033:0x45f4aa [ 393.168173] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 393.175929] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 393.183188] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 393.190446] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 393.197800] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 393.205059] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 393.225451] BTRFS error (device loop5): superblock checksum mismatch [ 393.263501] BTRFS error (device loop5): open_ctree failed 11:08:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, r0, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x10, 0x3f5, 0x510, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x8049) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000300), &(0x7f0000000340)=0x4) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x0, 0x0, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x400086) getsockopt$CAN_RAW_FD_FRAMES(r5, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$rds(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/145, 0x91}, {&(0x7f0000000100)=""/106, 0xfffffffffffffebf}], 0x2, 0x0, 0x0, 0x841}, 0x44851) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:29 executing program 5 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 394.047668] FAULT_INJECTION: forcing a failure. [ 394.047668] name failslab, interval 1, probability 0, space 0, times 0 [ 394.072457] CPU: 1 PID: 13108 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 394.080394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.089766] Call Trace: [ 394.092376] dump_stack+0x1b2/0x283 [ 394.096031] should_fail.cold+0x10a/0x154 [ 394.100213] should_failslab+0xd6/0x130 [ 394.104213] kmem_cache_alloc_node_trace+0x25a/0x400 [ 394.109339] __kmalloc_node+0x38/0x70 [ 394.113161] kvmalloc_node+0x88/0xd0 [ 394.116893] btrfs_mount+0xea4/0x2838 [ 394.120718] ? _find_next_bit+0xdb/0x100 [ 394.124801] ? pcpu_alloc+0x37d/0xf70 [ 394.128623] ? btrfs_remount+0x10c0/0x10c0 [ 394.132880] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 394.138352] ? rcu_read_lock_sched_held+0x10a/0x130 [ 394.143386] ? pcpu_alloc+0xe1/0xf70 [ 394.147125] ? __lockdep_init_map+0x100/0x560 [ 394.151639] ? __lockdep_init_map+0x100/0x560 [ 394.156149] mount_fs+0x92/0x2a0 [ 394.159525] vfs_kern_mount.part.0+0x5b/0x3c0 [ 394.164031] vfs_kern_mount+0x3c/0x60 [ 394.167849] btrfs_mount+0x2a0/0x2838 [ 394.171657] ? _find_next_bit+0xdb/0x100 [ 394.175730] ? pcpu_alloc+0x37d/0xf70 [ 394.179538] ? btrfs_remount+0x10c0/0x10c0 [ 394.183789] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 394.189253] ? rcu_read_lock_sched_held+0x10a/0x130 [ 394.194280] ? pcpu_alloc+0xe1/0xf70 [ 394.198007] ? pcpu_find_block_fit+0x380/0x380 [ 394.202602] ? __lockdep_init_map+0x100/0x560 [ 394.207105] ? __lockdep_init_map+0x100/0x560 [ 394.211612] mount_fs+0x92/0x2a0 [ 394.214992] vfs_kern_mount.part.0+0x5b/0x3c0 [ 394.219505] do_mount+0x3c9/0x25e0 [ 394.223055] ? copy_mount_string+0x40/0x40 [ 394.227304] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 394.232153] ? copy_mnt_ns+0x8a0/0x8a0 [ 394.236051] ? copy_mount_options+0x1ec/0x2e0 [ 394.240555] ? copy_mnt_ns+0x8a0/0x8a0 [ 394.244451] SyS_mount+0xa8/0x120 [ 394.247910] ? copy_mnt_ns+0x8a0/0x8a0 [ 394.251802] do_syscall_64+0x1d5/0x640 [ 394.255705] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 394.260903] RIP: 0033:0x45f4aa [ 394.264091] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 394.271801] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 394.279080] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 394.286356] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 394.293640] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 394.300921] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 394.343450] BTRFS error (device loop5): superblock checksum mismatch 11:08:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 394.393309] BTRFS error (device loop5): open_ctree failed 11:08:29 executing program 5 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000280)={0x20000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x84441, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x19}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9f}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) sendmsg$AUDIT_USER_TTY(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"/268], 0x10c}, 0x1, 0x0, 0x0, 0x20008040}, 0x20000014) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 394.508954] FAULT_INJECTION: forcing a failure. [ 394.508954] name failslab, interval 1, probability 0, space 0, times 0 [ 394.525541] CPU: 1 PID: 13142 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 394.533478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.542865] Call Trace: [ 394.545475] dump_stack+0x1b2/0x283 [ 394.549130] should_fail.cold+0x10a/0x154 [ 394.553298] should_failslab+0xd6/0x130 [ 394.557279] kmem_cache_alloc+0x28e/0x3c0 [ 394.561440] alloc_buffer_head+0x20/0xd0 [ 394.565527] alloc_page_buffers+0xb3/0x1f0 [ 394.569790] __getblk_gfp+0x32c/0x7b0 [ 394.573613] ? __mutex_unlock_slowpath+0x75/0x780 [ 394.578495] __bread_gfp+0x29/0x1f0 [ 394.582138] btrfs_read_dev_one_super+0x98/0x260 [ 394.586915] btrfs_read_dev_super+0x5a/0xa0 [ 394.591257] ? btrfs_read_dev_one_super+0x260/0x260 [ 394.596297] btrfs_get_bdev_and_sb+0xd7/0x2d0 [ 394.600803] ? fs_reclaim_acquire+0x10/0x10 [ 394.605147] __btrfs_open_devices+0x175/0xa40 [ 394.609670] ? find_device+0x100/0x100 [ 394.613578] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 394.619046] btrfs_open_devices+0x98/0xb0 [ 394.623214] btrfs_mount+0x10a2/0x2838 [ 394.625145] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1124 sclass=netlink_route_socket pid=13148 comm=syz-executor.4 [ 394.627117] ? _find_next_bit+0xdb/0x100 [ 394.627145] ? pcpu_alloc+0x37d/0xf70 [ 394.627159] ? btrfs_remount+0x10c0/0x10c0 [ 394.651567] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 394.657032] ? rcu_read_lock_sched_held+0x10a/0x130 [ 394.662061] ? pcpu_alloc+0xe1/0xf70 [ 394.665810] ? __lockdep_init_map+0x100/0x560 [ 394.668840] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1124 sclass=netlink_route_socket pid=13151 comm=syz-executor.4 [ 394.670319] ? __lockdep_init_map+0x100/0x560 [ 394.670336] mount_fs+0x92/0x2a0 [ 394.670351] vfs_kern_mount.part.0+0x5b/0x3c0 [ 394.670363] vfs_kern_mount+0x3c/0x60 [ 394.698802] btrfs_mount+0x2a0/0x2838 [ 394.702610] ? _find_next_bit+0xdb/0x100 [ 394.706677] ? pcpu_alloc+0x37d/0xf70 [ 394.710501] ? btrfs_remount+0x10c0/0x10c0 [ 394.714767] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 394.720235] ? rcu_read_lock_sched_held+0x10a/0x130 [ 394.725266] ? pcpu_alloc+0xe1/0xf70 [ 394.728999] ? pcpu_find_block_fit+0x380/0x380 [ 394.733596] ? __lockdep_init_map+0x100/0x560 [ 394.738108] ? __lockdep_init_map+0x100/0x560 [ 394.742622] mount_fs+0x92/0x2a0 [ 394.746006] vfs_kern_mount.part.0+0x5b/0x3c0 [ 394.750530] do_mount+0x3c9/0x25e0 [ 394.754098] ? copy_mount_string+0x40/0x40 [ 394.758351] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 394.763208] ? copy_mnt_ns+0x8a0/0x8a0 [ 394.767102] ? copy_mount_options+0x1ec/0x2e0 [ 394.771607] ? copy_mnt_ns+0x8a0/0x8a0 [ 394.775516] SyS_mount+0xa8/0x120 [ 394.778975] ? copy_mnt_ns+0x8a0/0x8a0 [ 394.782870] do_syscall_64+0x1d5/0x640 [ 394.786768] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 394.791961] RIP: 0033:0x45f4aa [ 394.795150] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 394.802868] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa 11:08:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x4, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) fcntl$setflags(r1, 0x2, 0x1) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="480900001114100026bd7000fedbdf25080001000100000001040000000000000800430021000000080003000100000008003e000100000008004f00020000000800010002000000"], 0x48}, 0x1, 0x0, 0x0, 0x9e346bc3192e73d4}, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 394.810146] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 394.817424] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 394.824705] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 394.831982] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 394.848676] BTRFS error (device loop5): superblock checksum mismatch 11:08:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x2001, 0x9) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000100)={0x6000, 0xf000}) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x4e22, @private=0xa010100}], 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000000)={0x3, [0x4, 0x9], 0x5}, 0x10) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 11:08:30 executing program 5 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 394.893326] BTRFS error (device loop5): open_ctree failed [ 395.009373] FAULT_INJECTION: forcing a failure. [ 395.009373] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 395.021225] CPU: 0 PID: 13174 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 395.029113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.038480] Call Trace: [ 395.041090] dump_stack+0x1b2/0x283 [ 395.044749] should_fail.cold+0x10a/0x154 [ 395.048921] __alloc_pages_nodemask+0x22b/0x2730 [ 395.053714] ? deref_stack_reg+0x8a/0xc0 [ 395.057814] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 395.063724] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 395.068582] ? trace_hardirqs_on+0x10/0x10 [ 395.072830] ? lock_downgrade+0x6e0/0x6e0 [ 395.077004] cache_grow_begin+0x91/0x410 [ 395.081084] cache_alloc_refill+0x28c/0x360 [ 395.085425] kmem_cache_alloc+0x333/0x3c0 [ 395.089589] getname_kernel+0x4e/0x340 [ 395.093492] kern_path+0x1b/0x40 [ 395.096873] lookup_bdev.part.0+0x60/0x160 [ 395.101121] ? blkdev_open+0x250/0x250 [ 395.105034] ? btrfs_open_devices+0x22/0xb0 11:08:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000000)=0x2) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 395.109376] blkdev_get_by_path+0x70/0xf0 [ 395.113547] btrfs_get_bdev_and_sb+0x33/0x2d0 [ 395.118061] ? fs_reclaim_acquire+0x10/0x10 [ 395.122404] __btrfs_open_devices+0x175/0xa40 [ 395.126933] ? find_device+0x100/0x100 [ 395.130970] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 395.136443] btrfs_open_devices+0x98/0xb0 [ 395.140744] btrfs_mount+0x10a2/0x2838 [ 395.144653] ? _find_next_bit+0xdb/0x100 [ 395.148723] ? pcpu_alloc+0x37d/0xf70 [ 395.152528] ? btrfs_remount+0x10c0/0x10c0 [ 395.156785] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 395.162249] ? rcu_read_lock_sched_held+0x10a/0x130 [ 395.167280] ? pcpu_alloc+0xe1/0xf70 [ 395.171015] ? __lockdep_init_map+0x100/0x560 [ 395.175526] ? __lockdep_init_map+0x100/0x560 [ 395.180050] mount_fs+0x92/0x2a0 [ 395.183436] vfs_kern_mount.part.0+0x5b/0x3c0 [ 395.187954] vfs_kern_mount+0x3c/0x60 [ 395.191776] btrfs_mount+0x2a0/0x2838 [ 395.195592] ? _find_next_bit+0xdb/0x100 [ 395.199668] ? pcpu_alloc+0x37d/0xf70 [ 395.203496] ? btrfs_remount+0x10c0/0x10c0 [ 395.207768] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 395.213237] ? rcu_read_lock_sched_held+0x10a/0x130 [ 395.218274] ? pcpu_alloc+0xe1/0xf70 [ 395.222017] ? pcpu_find_block_fit+0x380/0x380 [ 395.226617] ? __lockdep_init_map+0x100/0x560 [ 395.231139] ? __lockdep_init_map+0x100/0x560 [ 395.235652] mount_fs+0x92/0x2a0 [ 395.239041] vfs_kern_mount.part.0+0x5b/0x3c0 [ 395.243642] do_mount+0x3c9/0x25e0 [ 395.247201] ? copy_mount_string+0x40/0x40 [ 395.251452] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 395.256314] ? copy_mnt_ns+0x8a0/0x8a0 [ 395.260217] ? copy_mount_options+0x1ec/0x2e0 [ 395.264728] ? copy_mnt_ns+0x8a0/0x8a0 [ 395.268638] SyS_mount+0xa8/0x120 [ 395.272112] ? copy_mnt_ns+0x8a0/0x8a0 [ 395.276016] do_syscall_64+0x1d5/0x640 [ 395.279928] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 395.285131] RIP: 0033:0x45f4aa [ 395.288322] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 395.296040] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 395.303319] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 395.310594] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 395.317981] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 395.325257] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 395.350876] BTRFS error (device loop5): superblock checksum mismatch 11:08:30 executing program 5 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 395.393265] BTRFS error (device loop5): open_ctree failed [ 395.449733] FAULT_INJECTION: forcing a failure. [ 395.449733] name failslab, interval 1, probability 0, space 0, times 0 [ 395.461539] CPU: 1 PID: 13196 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 395.469449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.478811] Call Trace: [ 395.481417] dump_stack+0x1b2/0x283 [ 395.485065] should_fail.cold+0x10a/0x154 [ 395.489236] should_failslab+0xd6/0x130 [ 395.493212] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 395.497940] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 395.504783] sget_userns+0x102/0xc30 [ 395.508494] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 395.515324] ? btrfs_parse_early_options+0x310/0x310 [ 395.520434] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 395.527263] ? btrfs_parse_early_options+0x310/0x310 [ 395.532356] sget+0xd1/0x110 [ 395.535361] btrfs_mount+0x113c/0x2838 [ 395.539237] ? _find_next_bit+0xdb/0x100 [ 395.543296] ? pcpu_alloc+0x37d/0xf70 [ 395.547098] ? btrfs_remount+0x10c0/0x10c0 [ 395.551456] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 395.556987] ? rcu_read_lock_sched_held+0x10a/0x130 [ 395.562118] ? pcpu_alloc+0xe1/0xf70 [ 395.565842] ? __lockdep_init_map+0x100/0x560 [ 395.570333] ? __lockdep_init_map+0x100/0x560 [ 395.574819] mount_fs+0x92/0x2a0 [ 395.578176] vfs_kern_mount.part.0+0x5b/0x3c0 [ 395.582656] vfs_kern_mount+0x3c/0x60 [ 395.586464] btrfs_mount+0x2a0/0x2838 [ 395.590261] ? _find_next_bit+0xdb/0x100 [ 395.594309] ? pcpu_alloc+0x37d/0xf70 [ 395.598160] ? btrfs_remount+0x10c0/0x10c0 [ 395.602401] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 395.607869] ? rcu_read_lock_sched_held+0x10a/0x130 [ 395.612902] ? pcpu_alloc+0xe1/0xf70 [ 395.616607] ? pcpu_find_block_fit+0x380/0x380 [ 395.621175] ? __lockdep_init_map+0x100/0x560 [ 395.625664] ? __lockdep_init_map+0x100/0x560 [ 395.630164] mount_fs+0x92/0x2a0 [ 395.633545] vfs_kern_mount.part.0+0x5b/0x3c0 [ 395.638049] do_mount+0x3c9/0x25e0 [ 395.641590] ? copy_mount_string+0x40/0x40 [ 395.645824] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 395.650662] ? copy_mnt_ns+0x8a0/0x8a0 [ 395.654541] ? copy_mount_options+0x1ec/0x2e0 [ 395.659021] ? copy_mnt_ns+0x8a0/0x8a0 [ 395.662898] SyS_mount+0xa8/0x120 [ 395.666344] ? copy_mnt_ns+0x8a0/0x8a0 [ 395.670229] do_syscall_64+0x1d5/0x640 [ 395.674111] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 395.679376] RIP: 0033:0x45f4aa [ 395.682574] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 395.690271] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 395.697526] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 395.704786] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 395.712047] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 395.719301] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:32 executing program 5 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 397.061075] FAULT_INJECTION: forcing a failure. [ 397.061075] name failslab, interval 1, probability 0, space 0, times 0 [ 397.072314] CPU: 1 PID: 13211 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 397.080194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.089546] Call Trace: [ 397.092127] dump_stack+0x1b2/0x283 [ 397.095739] should_fail.cold+0x10a/0x154 [ 397.099872] should_failslab+0xd6/0x130 [ 397.103868] kmem_cache_alloc+0x40/0x3c0 [ 397.107976] radix_tree_node_alloc.constprop.0+0x1b4/0x300 [ 397.113585] __radix_tree_create+0x32b/0x4b0 [ 397.118078] ? check_preemption_disabled+0x35/0x240 [ 397.123077] page_cache_tree_insert+0x98/0x2a0 [ 397.127664] ? file_check_and_advance_wb_err+0x370/0x370 [ 397.133104] ? __add_to_page_cache_locked+0x22a/0x890 [ 397.138282] __add_to_page_cache_locked+0x23a/0x890 [ 397.143333] ? page_cache_tree_insert+0x2a0/0x2a0 [ 397.148157] ? lock_downgrade+0x6e0/0x6e0 [ 397.152288] add_to_page_cache_lru+0xea/0x300 [ 397.156769] ? add_to_page_cache_locked+0x40/0x40 [ 397.161594] ? __page_cache_alloc+0xd7/0x3c0 [ 397.165985] pagecache_get_page+0x2bb/0xa10 [ 397.170291] __getblk_gfp+0x234/0x7b0 [ 397.174076] ? __mutex_unlock_slowpath+0x75/0x780 [ 397.178904] __bread_gfp+0x29/0x1f0 [ 397.182519] btrfs_read_dev_one_super+0x98/0x260 [ 397.187276] btrfs_read_dev_super+0x5a/0xa0 [ 397.191585] ? btrfs_read_dev_one_super+0x260/0x260 [ 397.196641] btrfs_get_bdev_and_sb+0xd7/0x2d0 [ 397.201126] __btrfs_open_devices+0x175/0xa40 [ 397.205682] ? find_device+0x100/0x100 [ 397.209558] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 397.214995] btrfs_open_devices+0x98/0xb0 [ 397.219131] btrfs_mount+0x10a2/0x2838 [ 397.223006] ? _find_next_bit+0xdb/0x100 [ 397.227061] ? pcpu_alloc+0x37d/0xf70 [ 397.230854] ? btrfs_remount+0x10c0/0x10c0 [ 397.235077] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 397.240511] ? rcu_read_lock_sched_held+0x10a/0x130 [ 397.245508] ? pcpu_alloc+0xe1/0xf70 [ 397.249209] ? __lockdep_init_map+0x100/0x560 [ 397.253788] ? __lockdep_init_map+0x100/0x560 [ 397.258272] mount_fs+0x92/0x2a0 [ 397.261631] vfs_kern_mount.part.0+0x5b/0x3c0 [ 397.266111] vfs_kern_mount+0x3c/0x60 [ 397.269900] btrfs_mount+0x2a0/0x2838 [ 397.273683] ? _find_next_bit+0xdb/0x100 [ 397.277724] ? pcpu_alloc+0x37d/0xf70 [ 397.281525] ? btrfs_remount+0x10c0/0x10c0 [ 397.285759] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 397.291194] ? rcu_read_lock_sched_held+0x10a/0x130 [ 397.296209] ? pcpu_alloc+0xe1/0xf70 [ 397.299909] ? pcpu_find_block_fit+0x380/0x380 [ 397.304473] ? __lockdep_init_map+0x100/0x560 [ 397.308949] ? __lockdep_init_map+0x100/0x560 [ 397.313432] mount_fs+0x92/0x2a0 [ 397.316787] vfs_kern_mount.part.0+0x5b/0x3c0 [ 397.321386] do_mount+0x3c9/0x25e0 [ 397.324911] ? copy_mount_string+0x40/0x40 [ 397.329129] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 397.333955] ? copy_mnt_ns+0x8a0/0x8a0 [ 397.337823] ? copy_mount_options+0x1ec/0x2e0 [ 397.342308] ? copy_mnt_ns+0x8a0/0x8a0 [ 397.346194] SyS_mount+0xa8/0x120 [ 397.349773] ? copy_mnt_ns+0x8a0/0x8a0 [ 397.353684] do_syscall_64+0x1d5/0x640 11:08:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 397.357604] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 397.362779] RIP: 0033:0x45f4aa [ 397.365997] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 397.373686] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 397.380936] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 397.388237] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 397.395491] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 397.402742] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x93}, 0x0, 0xfffffffffffffffc, 0x0, 0x5, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000700)=[{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000100)="6a841ce5c70af2a387e05b8eff56217fb78a651d1acd434b93d45818c91bcdc2d25d0cd7bb21034f033de88c205d6289929d1ac0edbab6e5f942cbf9f1fe777222ceffcb1343fb1d", 0x48}, {&(0x7f00000001c0)="97fa39e397edcfb661c3b8d56537095cc015634ec3de2338ba53f7fa3b2787a289b9bf4298848d00aa059c6336", 0x2d}, {&(0x7f0000000240)="2b8a1da7bca693319e8a8d9a280f386808417b53e00e9e3fbf9a32d50de52014d88cff6b47112cf9165d8492bf426c33ea1d3b0ad4fd377b66e1b5a27ca9b93b2df593a3dab288dfbba416a2b6911249dbfd2789b9c9549b4d41a69cbbc1a314af5423a9f33a83e0d95f66b7392b0769fc0f254aae8995e91a0d0c1cbcc2694c4e22971200dd13efcf39fecb9854480b07760f988459a37bccd5bab7ab2f2e7d2840a060edf4b8e20479199e21ae070a885a4a1a224482d2f2d4b43bb3b7441a4958648d9be33ba2d191f81e23cfb83b02b06e4166", 0xd5}, {&(0x7f0000000340)="d2abb3d3", 0x4}], 0x4, &(0x7f00000003c0)=[@iv={0x50, 0x117, 0x2, 0x3b, "276b85be8c89bb76027a8c521b4027af34600356cd5d2aaaf7b9cb5387b4b706f277ef10726589ef691b54b39dca68626e2505abbc1577dded5a85"}, @assoc={0x18, 0x117, 0x4, 0x9}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1}, @iv={0x70, 0x117, 0x2, 0x57, "cb6c4bc28de71dfd8e27f299327b852629c697904810d376bdfdfb989d631dbb3237a864774d086aebb209a1f53068339a51c4d524f9db07fcf08445bc6b82cd7147b2600844db8d2a344e62f1e2fdc1a9c89596401c3f"}, @iv={0xe0, 0x117, 0x2, 0xc6, "fecdcfe1c066ab9c6992b5fc2bbbcfe3a6f1a74a039b6f2455ed1a9e246368f37d2f5c33a39fb0452a61cfd5ec5aa41e2d0084e2e166116e48a13c0e9994c5c6e837fff3575e3c4d8a1db7abebb83eccdc9e565a35ec68162c5da6231023a9a489b94d0d60ab330a427cf6326162a5184bad46bc093c14d514697b098d2b335244a64e15977f96bb67dae048d4ab8729bad90b36aaa5a3e3eace9579d7be2e536af3557b10bf0b375ad54d0eaf19e5990902fdb30192e0842c8e5b11751da794c356d0d85c5a"}, @iv={0xf8, 0x117, 0x2, 0xe3, "3e4ceea40415488a96c0ac9b86c473b3fc4486ec472a85e4dfaedb507d0b2751301c3525d51e59751604fed8b5b78e83bd34057b56f30beaf1de9b9c38ef9f5b3971f3a41fc688dca08460f40942a8c4f24c7f50c709118942ad69ee174bc348fee05522043cc7593468873a0c9bc06b750f596ad675b22a49bc474b2db533065aa11a228864ffc5b4d0543c6265b25c22a1104e66851486944a8689b215a8b78d4a9adbf22723bd28dbfb156b348d545d9f3bb5335479cd8661fe0123856c3aa2055e452ffdc44b63c91eced281462aa8417ca1d97d33dc8e2d9c10c27cdf0a565353"}, @assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}, @op={0x18}], 0x328, 0x40}], 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) r3 = dup2(r2, r0) sendto$rxrpc(r3, &(0x7f0000000000)="b1cba960cb6d7158b328aed7e59a397b35328c4e9e8531c6e7b8c8cd35e782f9751479f7453256e54c3a6b8ccce774dc31ae87d0c08606b3057c982b9e67b56e82318742c53363c146cd4c24dc6f426dc9d0ac06740206942d83e6c14edac2e4f25a1f1c5a6e3548d8e64820f4e43f9093c12270535dd056938efa7a6f5be29b83dc39f9c09a6b23cc1146a0212070fd9c", 0x91, 0x4000, &(0x7f00000000c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @private=0xa010102}}, 0x24) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/157, 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 397.433742] BTRFS error (device loop5): superblock checksum mismatch [ 397.441001] ptrace attach of "/root/syz-executor.2"[13218] was attempted by "/root/syz-executor.2"[13221] 11:08:32 executing program 5 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 397.505657] BTRFS error (device loop5): open_ctree failed [ 397.616896] FAULT_INJECTION: forcing a failure. [ 397.616896] name failslab, interval 1, probability 0, space 0, times 0 [ 397.628812] CPU: 0 PID: 13243 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 397.636726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.646092] Call Trace: [ 397.648702] dump_stack+0x1b2/0x283 [ 397.652355] should_fail.cold+0x10a/0x154 [ 397.656527] ? mempool_free+0x1d0/0x1d0 [ 397.660519] should_failslab+0xd6/0x130 [ 397.664510] kmem_cache_alloc+0x40/0x3c0 [ 397.668590] ? mempool_free+0x1d0/0x1d0 [ 397.672582] mempool_alloc+0x111/0x2d0 [ 397.676497] ? remove_element.isra.0+0x1b0/0x1b0 [ 397.681282] ? mark_held_locks+0xa6/0xf0 [ 397.685366] ? pagecache_get_page+0x12d/0xa10 [ 397.689884] ? __find_get_block+0x81d/0xbf0 [ 397.694240] bio_alloc_bioset+0x352/0x640 [ 397.698416] ? bvec_alloc+0x2d0/0x2d0 [ 397.702247] ? __getblk_gfp+0x5c/0x7b0 [ 397.706160] submit_bh_wbc+0xf5/0x6f0 [ 397.709998] __bread_gfp+0xff/0x1f0 [ 397.713651] btrfs_read_dev_one_super+0x98/0x260 [ 397.718432] btrfs_read_dev_super+0x5a/0xa0 [ 397.722775] ? btrfs_read_dev_one_super+0x260/0x260 [ 397.727815] btrfs_get_bdev_and_sb+0xd7/0x2d0 [ 397.732329] ? fs_reclaim_acquire+0x10/0x10 [ 397.736676] __btrfs_open_devices+0x175/0xa40 [ 397.741203] ? find_device+0x100/0x100 [ 397.745121] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 397.750594] btrfs_open_devices+0x98/0xb0 [ 397.754761] btrfs_mount+0x10a2/0x2838 [ 397.758674] ? _find_next_bit+0xdb/0x100 [ 397.762760] ? pcpu_alloc+0x37d/0xf70 [ 397.766582] ? btrfs_remount+0x10c0/0x10c0 [ 397.770848] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 397.776319] ? rcu_read_lock_sched_held+0x10a/0x130 [ 397.781356] ? pcpu_alloc+0xe1/0xf70 [ 397.785224] ? __lockdep_init_map+0x100/0x560 [ 397.789745] ? __lockdep_init_map+0x100/0x560 [ 397.794266] mount_fs+0x92/0x2a0 [ 397.797660] vfs_kern_mount.part.0+0x5b/0x3c0 [ 397.802183] vfs_kern_mount+0x3c/0x60 [ 397.806012] btrfs_mount+0x2a0/0x2838 [ 397.809837] ? _find_next_bit+0xdb/0x100 [ 397.813917] ? pcpu_alloc+0x37d/0xf70 [ 397.817736] ? btrfs_remount+0x10c0/0x10c0 [ 397.821996] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 397.827473] ? rcu_read_lock_sched_held+0x10a/0x130 [ 397.832507] ? pcpu_alloc+0xe1/0xf70 [ 397.836262] ? pcpu_find_block_fit+0x380/0x380 [ 397.840867] ? __lockdep_init_map+0x100/0x560 [ 397.845387] ? __lockdep_init_map+0x100/0x560 [ 397.849905] mount_fs+0x92/0x2a0 [ 397.853296] vfs_kern_mount.part.0+0x5b/0x3c0 [ 397.857815] do_mount+0x3c9/0x25e0 [ 397.861382] ? copy_mount_string+0x40/0x40 [ 397.865636] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 397.870503] ? copy_mnt_ns+0x8a0/0x8a0 [ 397.874412] ? copy_mount_options+0x1ec/0x2e0 [ 397.878926] ? copy_mnt_ns+0x8a0/0x8a0 [ 397.882834] SyS_mount+0xa8/0x120 [ 397.886305] ? copy_mnt_ns+0x8a0/0x8a0 [ 397.890223] do_syscall_64+0x1d5/0x640 [ 397.894140] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 397.899343] RIP: 0033:0x45f4aa [ 397.902543] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 397.910263] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 397.917544] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 397.924833] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 397.932114] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 397.939396] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 397.981137] BTRFS error (device loop5): superblock checksum mismatch 11:08:33 executing program 5 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 398.023418] BTRFS error (device loop5): open_ctree failed [ 398.091664] FAULT_INJECTION: forcing a failure. [ 398.091664] name failslab, interval 1, probability 0, space 0, times 0 [ 398.103906] CPU: 0 PID: 13260 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 398.111815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.121314] Call Trace: [ 398.123933] dump_stack+0x1b2/0x283 [ 398.127595] should_fail.cold+0x10a/0x154 [ 398.131769] ? mempool_free+0x1d0/0x1d0 [ 398.135765] should_failslab+0xd6/0x130 [ 398.139772] kmem_cache_alloc+0x40/0x3c0 [ 398.143847] ? mempool_free+0x1d0/0x1d0 [ 398.147836] mempool_alloc+0x111/0x2d0 [ 398.151754] ? remove_element.isra.0+0x1b0/0x1b0 [ 398.156537] ? mark_held_locks+0xa6/0xf0 [ 398.160611] ? pagecache_get_page+0x12d/0xa10 [ 398.165139] ? __find_get_block+0x81d/0xbf0 [ 398.169478] bio_alloc_bioset+0x352/0x640 [ 398.173641] ? bvec_alloc+0x2d0/0x2d0 [ 398.177454] ? __getblk_gfp+0x5c/0x7b0 [ 398.181366] submit_bh_wbc+0xf5/0x6f0 [ 398.185211] __bread_gfp+0xff/0x1f0 [ 398.188860] btrfs_read_dev_one_super+0x98/0x260 [ 398.193640] btrfs_read_dev_super+0x5a/0xa0 [ 398.198017] ? btrfs_read_dev_one_super+0x260/0x260 [ 398.203060] btrfs_get_bdev_and_sb+0xd7/0x2d0 [ 398.207574] __btrfs_open_devices+0x175/0xa40 [ 398.212097] ? find_device+0x100/0x100 [ 398.216010] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 398.221483] btrfs_open_devices+0x98/0xb0 [ 398.225650] btrfs_mount+0x10a2/0x2838 [ 398.229559] ? _find_next_bit+0xdb/0x100 [ 398.233637] ? pcpu_alloc+0x37d/0xf70 [ 398.237454] ? btrfs_remount+0x10c0/0x10c0 [ 398.241716] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 398.247186] ? rcu_read_lock_sched_held+0x10a/0x130 [ 398.252221] ? pcpu_alloc+0xe1/0xf70 [ 398.255959] ? __lockdep_init_map+0x100/0x560 [ 398.260476] ? __lockdep_init_map+0x100/0x560 [ 398.264992] mount_fs+0x92/0x2a0 [ 398.268382] vfs_kern_mount.part.0+0x5b/0x3c0 [ 398.273047] vfs_kern_mount+0x3c/0x60 [ 398.276878] btrfs_mount+0x2a0/0x2838 [ 398.280709] ? _find_next_bit+0xdb/0x100 [ 398.284786] ? pcpu_alloc+0x37d/0xf70 [ 398.288606] ? btrfs_remount+0x10c0/0x10c0 [ 398.292891] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 398.298366] ? rcu_read_lock_sched_held+0x10a/0x130 [ 398.303398] ? pcpu_alloc+0xe1/0xf70 [ 398.307137] ? pcpu_find_block_fit+0x380/0x380 [ 398.311735] ? __lockdep_init_map+0x100/0x560 [ 398.316258] ? __lockdep_init_map+0x100/0x560 [ 398.320773] mount_fs+0x92/0x2a0 [ 398.324160] vfs_kern_mount.part.0+0x5b/0x3c0 [ 398.328686] do_mount+0x3c9/0x25e0 [ 398.332247] ? copy_mount_string+0x40/0x40 [ 398.336501] ? copy_mount_options+0x140/0x2e0 [ 398.341106] ? __sanitizer_cov_trace_pc+0x4a/0x50 [ 398.345969] ? copy_mount_options+0x1ec/0x2e0 [ 398.350611] ? copy_mnt_ns+0x8a0/0x8a0 [ 398.354518] SyS_mount+0xa8/0x120 [ 398.358021] ? copy_mnt_ns+0x8a0/0x8a0 [ 398.361933] do_syscall_64+0x1d5/0x640 [ 398.365843] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 398.371051] RIP: 0033:0x45f4aa [ 398.374246] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 398.381973] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 398.389250] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 398.396537] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 398.403935] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 398.411216] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 398.588619] BTRFS error (device loop5): superblock checksum mismatch [ 398.633219] BTRFS error (device loop5): open_ctree failed 11:08:34 executing program 5 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 398.748521] FAULT_INJECTION: forcing a failure. [ 398.748521] name failslab, interval 1, probability 0, space 0, times 0 [ 398.760833] CPU: 0 PID: 13272 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 398.768748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.778113] Call Trace: [ 398.780729] dump_stack+0x1b2/0x283 [ 398.784402] should_fail.cold+0x10a/0x154 [ 398.788575] should_failslab+0xd6/0x130 [ 398.792567] __kmalloc+0x2c1/0x400 [ 398.796133] ? __list_lru_init+0x67/0x650 [ 398.800302] __list_lru_init+0x67/0x650 [ 398.804301] sget_userns+0x4e4/0xc30 [ 398.808034] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 398.814890] ? btrfs_parse_early_options+0x310/0x310 [ 398.820017] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 398.826873] ? btrfs_parse_early_options+0x310/0x310 [ 398.831993] sget+0xd1/0x110 [ 398.835038] btrfs_mount+0x113c/0x2838 [ 398.838965] ? _find_next_bit+0xdb/0x100 [ 398.843042] ? pcpu_alloc+0x37d/0xf70 [ 398.846859] ? btrfs_remount+0x10c0/0x10c0 [ 398.851115] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 398.856587] ? rcu_read_lock_sched_held+0x10a/0x130 [ 398.861622] ? pcpu_alloc+0xe1/0xf70 [ 398.865365] ? __lockdep_init_map+0x100/0x560 [ 398.869880] ? __lockdep_init_map+0x100/0x560 [ 398.874395] mount_fs+0x92/0x2a0 [ 398.877782] vfs_kern_mount.part.0+0x5b/0x3c0 [ 398.882297] vfs_kern_mount+0x3c/0x60 [ 398.886123] btrfs_mount+0x2a0/0x2838 [ 398.889949] ? _find_next_bit+0xdb/0x100 [ 398.894027] ? pcpu_alloc+0x37d/0xf70 [ 398.897853] ? btrfs_remount+0x10c0/0x10c0 [ 398.902121] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 398.907595] ? rcu_read_lock_sched_held+0x10a/0x130 [ 398.912630] ? pcpu_alloc+0xe1/0xf70 [ 398.916372] ? pcpu_find_block_fit+0x380/0x380 [ 398.920972] ? __lockdep_init_map+0x100/0x560 [ 398.925485] ? __lockdep_init_map+0x100/0x560 [ 398.930008] mount_fs+0x92/0x2a0 [ 398.933398] vfs_kern_mount.part.0+0x5b/0x3c0 [ 398.937914] do_mount+0x3c9/0x25e0 [ 398.941478] ? copy_mount_string+0x40/0x40 [ 398.945730] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 398.950597] ? copy_mnt_ns+0x8a0/0x8a0 [ 398.954508] ? copy_mount_options+0x1ec/0x2e0 [ 398.959020] ? copy_mnt_ns+0x8a0/0x8a0 [ 398.962922] SyS_mount+0xa8/0x120 [ 398.966394] ? copy_mnt_ns+0x8a0/0x8a0 [ 398.970306] do_syscall_64+0x1d5/0x640 [ 398.974226] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 398.979426] RIP: 0033:0x45f4aa [ 398.982619] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 398.990338] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 398.997840] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 399.005119] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 399.012398] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 399.019678] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000080)={r2, 0x2}) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:34 executing program 5 (fault-call:0 fault-nth:84): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 399.197199] FAULT_INJECTION: forcing a failure. [ 399.197199] name failslab, interval 1, probability 0, space 0, times 0 [ 399.212265] CPU: 1 PID: 13283 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 399.220285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.229713] Call Trace: [ 399.232364] dump_stack+0x1b2/0x283 [ 399.236004] should_fail.cold+0x10a/0x154 [ 399.240183] should_failslab+0xd6/0x130 [ 399.244154] __kmalloc+0x2c1/0x400 [ 399.247685] ? __list_lru_init+0x67/0x650 [ 399.251825] __list_lru_init+0x67/0x650 [ 399.255801] sget_userns+0x4e4/0xc30 [ 399.259510] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 399.266465] ? btrfs_parse_early_options+0x310/0x310 [ 399.271626] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 399.278454] ? btrfs_parse_early_options+0x310/0x310 [ 399.283548] sget+0xd1/0x110 [ 399.286689] btrfs_mount+0x113c/0x2838 [ 399.290572] ? _find_next_bit+0xdb/0x100 [ 399.294623] ? pcpu_alloc+0x37d/0xf70 [ 399.298409] ? btrfs_remount+0x10c0/0x10c0 [ 399.302638] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 399.308084] ? rcu_read_lock_sched_held+0x10a/0x130 [ 399.313094] ? pcpu_alloc+0xe1/0xf70 [ 399.316805] ? __lockdep_init_map+0x100/0x560 [ 399.321286] ? __lockdep_init_map+0x100/0x560 [ 399.325767] mount_fs+0x92/0x2a0 [ 399.329120] vfs_kern_mount.part.0+0x5b/0x3c0 [ 399.333606] vfs_kern_mount+0x3c/0x60 [ 399.337395] btrfs_mount+0x2a0/0x2838 [ 399.341183] ? _find_next_bit+0xdb/0x100 [ 399.345233] ? pcpu_alloc+0x37d/0xf70 [ 399.349022] ? btrfs_remount+0x10c0/0x10c0 [ 399.353246] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 399.358688] ? rcu_read_lock_sched_held+0x10a/0x130 [ 399.363698] ? pcpu_alloc+0xe1/0xf70 [ 399.367398] ? pcpu_find_block_fit+0x380/0x380 [ 399.371963] ? __lockdep_init_map+0x100/0x560 [ 399.376454] ? __lockdep_init_map+0x100/0x560 [ 399.380951] mount_fs+0x92/0x2a0 [ 399.384319] vfs_kern_mount.part.0+0x5b/0x3c0 [ 399.388800] do_mount+0x3c9/0x25e0 [ 399.392325] ? copy_mount_string+0x40/0x40 [ 399.396546] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 399.401370] ? copy_mnt_ns+0x8a0/0x8a0 [ 399.405248] ? copy_mount_options+0x1ec/0x2e0 [ 399.409760] ? copy_mnt_ns+0x8a0/0x8a0 [ 399.413639] SyS_mount+0xa8/0x120 [ 399.417075] ? copy_mnt_ns+0x8a0/0x8a0 [ 399.420955] do_syscall_64+0x1d5/0x640 [ 399.424832] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 399.430003] RIP: 0033:0x45f4aa [ 399.433174] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 399.440869] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa 11:08:34 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0xad}, 0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe}}, r0, 0x2, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) [ 399.448135] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 399.455398] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 399.462657] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 399.469913] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:34 executing program 5 (fault-call:0 fault-nth:85): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) [ 399.575132] FAULT_INJECTION: forcing a failure. [ 399.575132] name failslab, interval 1, probability 0, space 0, times 0 [ 399.587033] CPU: 1 PID: 13297 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 399.594980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.604339] Call Trace: [ 399.606937] dump_stack+0x1b2/0x283 [ 399.610674] should_fail.cold+0x10a/0x154 [ 399.614833] should_failslab+0xd6/0x130 [ 399.618813] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 399.623495] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 399.630346] sget_userns+0x102/0xc30 [ 399.634069] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 399.640922] ? btrfs_parse_early_options+0x310/0x310 [ 399.646041] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 399.652885] ? btrfs_parse_early_options+0x310/0x310 [ 399.657997] sget+0xd1/0x110 [ 399.661021] btrfs_mount+0x113c/0x2838 [ 399.664919] ? _find_next_bit+0xdb/0x100 [ 399.668994] ? pcpu_alloc+0x37d/0xf70 [ 399.672814] ? btrfs_remount+0x10c0/0x10c0 [ 399.677075] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 399.682553] ? rcu_read_lock_sched_held+0x10a/0x130 [ 399.687580] ? pcpu_alloc+0xe1/0xf70 [ 399.691314] ? __lockdep_init_map+0x100/0x560 [ 399.695825] ? __lockdep_init_map+0x100/0x560 [ 399.700331] mount_fs+0x92/0x2a0 [ 399.703708] vfs_kern_mount.part.0+0x5b/0x3c0 [ 399.708208] vfs_kern_mount+0x3c/0x60 [ 399.712011] btrfs_mount+0x2a0/0x2838 [ 399.715821] ? _find_next_bit+0xdb/0x100 [ 399.719886] ? pcpu_alloc+0x37d/0xf70 [ 399.723692] ? btrfs_remount+0x10c0/0x10c0 [ 399.727937] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 399.733395] ? rcu_read_lock_sched_held+0x10a/0x130 [ 399.738434] ? pcpu_alloc+0xe1/0xf70 [ 399.742157] ? pcpu_find_block_fit+0x380/0x380 [ 399.746744] ? __lockdep_init_map+0x100/0x560 [ 399.751248] ? __lockdep_init_map+0x100/0x560 [ 399.755763] mount_fs+0x92/0x2a0 [ 399.759144] vfs_kern_mount.part.0+0x5b/0x3c0 [ 399.763650] do_mount+0x3c9/0x25e0 [ 399.767204] ? copy_mount_string+0x40/0x40 [ 399.771459] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 399.776317] ? copy_mnt_ns+0x8a0/0x8a0 [ 399.780219] ? copy_mount_options+0x1ec/0x2e0 [ 399.784731] ? copy_mnt_ns+0x8a0/0x8a0 [ 399.788629] SyS_mount+0xa8/0x120 [ 399.792100] ? copy_mnt_ns+0x8a0/0x8a0 [ 399.796030] do_syscall_64+0x1d5/0x640 [ 399.799940] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 399.805141] RIP: 0033:0x45f4aa [ 399.808334] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 399.816052] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 399.823329] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 399.830596] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 399.837848] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 399.845112] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 11:08:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 11:08:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d294", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(r0, 0x11) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:35 executing program 5 (fault-call:0 fault-nth:86): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000f5ffffff0000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 11:08:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00"/157, 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:08:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d868ec268dcff47d010000805acf4f8f3646f933432479aed77f492b415b36cee00a06d49d8e99adaf83dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b14f2ac662f901371b884b3c5d14b53455560c8ef00fca4fafa924edfe927aeeb72e0d050fea00000000000000000000000000000000000000000000000000000000dd3205a22db34a031f1d188def9ced8ff3b827eefe263682cba2d12b82f3206b566d287e020943b7a515416d196e6ec292d29481", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) tkill(0x0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 400.544848] FAULT_INJECTION: forcing a failure. [ 400.544848] name failslab, interval 1, probability 0, space 0, times 0 [ 400.576803] CPU: 0 PID: 13326 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 400.584733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.594204] Call Trace: [ 400.596813] dump_stack+0x1b2/0x283 [ 400.600471] should_fail.cold+0x10a/0x154 [ 400.604657] should_failslab+0xd6/0x130 [ 400.608650] __kmalloc+0x2c1/0x400 [ 400.612202] ? register_shrinker+0x1ab/0x220 [ 400.616624] register_shrinker+0x1ab/0x220 [ 400.620889] sget_userns+0x9c5/0xc30 [ 400.624624] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 400.631482] ? btrfs_parse_early_options+0x310/0x310 [ 400.636608] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1e/0x1e [ 400.643462] ? btrfs_parse_early_options+0x310/0x310 [ 400.648583] sget+0xd1/0x110 [ 400.651615] btrfs_mount+0x113c/0x2838 [ 400.655539] ? _find_next_bit+0xdb/0x100 [ 400.659609] ? pcpu_alloc+0x37d/0xf70 [ 400.663423] ? btrfs_remount+0x10c0/0x10c0 [ 400.667670] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 400.673129] ? rcu_read_lock_sched_held+0x10a/0x130 [ 400.678153] ? pcpu_alloc+0xe1/0xf70 [ 400.681882] ? __lockdep_init_map+0x100/0x560 [ 400.686381] ? __lockdep_init_map+0x100/0x560 [ 400.690886] mount_fs+0x92/0x2a0 [ 400.694263] vfs_kern_mount.part.0+0x5b/0x3c0 [ 400.698789] vfs_kern_mount+0x3c/0x60 [ 400.702580] btrfs_mount+0x2a0/0x2838 [ 400.706370] ? _find_next_bit+0xdb/0x100 [ 400.710419] ? pcpu_alloc+0x37d/0xf70 [ 400.714210] ? btrfs_remount+0x10c0/0x10c0 [ 400.718442] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 400.723884] ? rcu_read_lock_sched_held+0x10a/0x130 [ 400.728892] ? pcpu_alloc+0xe1/0xf70 [ 400.732594] ? pcpu_find_block_fit+0x380/0x380 [ 400.737162] ? __lockdep_init_map+0x100/0x560 [ 400.741643] ? __lockdep_init_map+0x100/0x560 [ 400.746131] mount_fs+0x92/0x2a0 [ 400.749487] vfs_kern_mount.part.0+0x5b/0x3c0 [ 400.753972] do_mount+0x3c9/0x25e0 [ 400.757503] ? copy_mount_string+0x40/0x40 [ 400.761726] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 400.766556] ? copy_mnt_ns+0x8a0/0x8a0 [ 400.770430] ? copy_mount_options+0x1ec/0x2e0 [ 400.774907] ? copy_mnt_ns+0x8a0/0x8a0 [ 400.778782] SyS_mount+0xa8/0x120 [ 400.782221] ? copy_mnt_ns+0x8a0/0x8a0 [ 400.786101] do_syscall_64+0x1d5/0x640 [ 400.789987] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 400.795166] RIP: 0033:0x45f4aa [ 400.798339] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 400.806039] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 400.813297] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 400.820557] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 400.827817] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 400.835259] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 400.885657] ================================================================== [ 400.893324] BUG: KASAN: use-after-free in btrfs_mount+0x2412/0x2838 [ 400.899715] Read of size 8 at addr ffff88805b01b298 by task syz-executor.5/13326 [ 400.907236] [ 400.908858] CPU: 0 PID: 13326 Comm: syz-executor.5 Not tainted 4.14.184-syzkaller #0 [ 400.916729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.926169] Call Trace: [ 400.928942] dump_stack+0x1b2/0x283 [ 400.932561] ? btrfs_mount+0x2412/0x2838 [ 400.936650] print_address_description.cold+0x54/0x1dc [ 400.941927] ? btrfs_mount+0x2412/0x2838 [ 400.945974] kasan_report.cold+0xa9/0x2b9 [ 400.950113] btrfs_mount+0x2412/0x2838 [ 400.953990] ? _find_next_bit+0xdb/0x100 [ 400.958037] ? pcpu_alloc+0x37d/0xf70 [ 400.961893] ? btrfs_remount+0x10c0/0x10c0 [ 400.966126] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 400.971565] ? rcu_read_lock_sched_held+0x10a/0x130 [ 400.976590] ? pcpu_alloc+0xe1/0xf70 [ 400.980313] ? __lockdep_init_map+0x100/0x560 [ 400.984795] ? __lockdep_init_map+0x100/0x560 [ 400.989378] mount_fs+0x92/0x2a0 [ 400.992736] vfs_kern_mount.part.0+0x5b/0x3c0 [ 400.997222] vfs_kern_mount+0x3c/0x60 [ 401.001015] btrfs_mount+0x2a0/0x2838 [ 401.004809] ? _find_next_bit+0xdb/0x100 [ 401.008865] ? pcpu_alloc+0x37d/0xf70 [ 401.012661] ? btrfs_remount+0x10c0/0x10c0 [ 401.016887] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 401.022326] ? rcu_read_lock_sched_held+0x10a/0x130 [ 401.027331] ? pcpu_alloc+0xe1/0xf70 [ 401.031047] ? pcpu_find_block_fit+0x380/0x380 [ 401.035623] ? __lockdep_init_map+0x100/0x560 [ 401.040106] ? __lockdep_init_map+0x100/0x560 [ 401.044593] mount_fs+0x92/0x2a0 [ 401.047952] vfs_kern_mount.part.0+0x5b/0x3c0 [ 401.052442] do_mount+0x3c9/0x25e0 [ 401.055977] ? copy_mount_string+0x40/0x40 [ 401.060212] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 401.065042] ? copy_mnt_ns+0x8a0/0x8a0 [ 401.068924] ? copy_mount_options+0x1ec/0x2e0 [ 401.073410] ? copy_mnt_ns+0x8a0/0x8a0 [ 401.077284] SyS_mount+0xa8/0x120 [ 401.080724] ? copy_mnt_ns+0x8a0/0x8a0 [ 401.084604] do_syscall_64+0x1d5/0x640 [ 401.088483] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 401.093658] RIP: 0033:0x45f4aa [ 401.096829] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 401.104522] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 401.111839] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 401.119097] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 401.126362] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 401.133729] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 401.140995] [ 401.142611] Allocated by task 13326: [ 401.146319] kasan_kmalloc.part.0+0x4f/0xd0 [ 401.150638] __kmalloc_node+0x4c/0x70 [ 401.154432] kvmalloc_node+0x88/0xd0 [ 401.158132] btrfs_mount+0xea4/0x2838 [ 401.161923] mount_fs+0x92/0x2a0 [ 401.165276] vfs_kern_mount.part.0+0x5b/0x3c0 [ 401.169758] vfs_kern_mount+0x3c/0x60 [ 401.173542] btrfs_mount+0x2a0/0x2838 [ 401.177334] mount_fs+0x92/0x2a0 [ 401.180696] vfs_kern_mount.part.0+0x5b/0x3c0 [ 401.185180] do_mount+0x3c9/0x25e0 [ 401.188707] SyS_mount+0xa8/0x120 [ 401.192148] do_syscall_64+0x1d5/0x640 [ 401.196032] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 401.201207] [ 401.202821] Freed by task 13326: [ 401.206176] kasan_slab_free+0xaf/0x190 [ 401.210144] kfree+0xcb/0x260 [ 401.213243] kvfree+0x45/0x50 [ 401.216336] deactivate_locked_super+0x6c/0xd0 [ 401.220928] sget_userns+0x9df/0xc30 [ 401.224630] sget+0xd1/0x110 [ 401.227633] btrfs_mount+0x113c/0x2838 [ 401.231513] mount_fs+0x92/0x2a0 [ 401.234870] vfs_kern_mount.part.0+0x5b/0x3c0 [ 401.239350] vfs_kern_mount+0x3c/0x60 [ 401.243149] btrfs_mount+0x2a0/0x2838 [ 401.246948] mount_fs+0x92/0x2a0 [ 401.250314] vfs_kern_mount.part.0+0x5b/0x3c0 [ 401.254809] do_mount+0x3c9/0x25e0 [ 401.258342] SyS_mount+0xa8/0x120 [ 401.261877] do_syscall_64+0x1d5/0x640 [ 401.265887] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 401.271073] [ 401.272739] The buggy address belongs to the object at ffff88805b019a00 [ 401.272739] which belongs to the cache kmalloc-16384 of size 16384 [ 401.285741] The buggy address is located 6296 bytes inside of [ 401.285741] 16384-byte region [ffff88805b019a00, ffff88805b01da00) [ 401.297855] The buggy address belongs to the page: [ 401.302775] page:ffffea00016c0600 count:1 mapcount:0 mapping:ffff88805b019a00 index:0x0 compound_mapcount: 0 [ 401.312735] flags: 0xfffe0000008100(slab|head) [ 401.317303] raw: 00fffe0000008100 ffff88805b019a00 0000000000000000 0000000100000001 [ 401.325169] raw: ffffea000153b620 ffff8880aa801c48 ffff8880aa802200 0000000000000000 [ 401.333033] page dumped because: kasan: bad access detected [ 401.338726] [ 401.340335] Memory state around the buggy address: [ 401.345248] ffff88805b01b180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 401.352591] ffff88805b01b200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 401.359936] >ffff88805b01b280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 401.367276] ^ [ 401.371408] ffff88805b01b300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 401.378771] ffff88805b01b380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 11:08:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x28, 0x140a, 0x300, 0x70bd26, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0xc000}, 0x44041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="7959c30d02b6f5cc4c0f382bdffdaa2adaf23d5e458d4132cbc5ff859b5dc9dbf9935d20ee3a188829f6b3b8ae7ec4cf102f058650921baadfea7fb9a869ae679cc100c9dd6c3520c4c9a28b666ff62bb56d824bd91f2f306cd0e21be65dd613cf63c28fc744ab16ee4bca40ff2e1c91f1387ef2393f46fb829ad5b7504e6e7c9bbfc1e06728b3b189a4e9b4f71df0e22af1a11510d87e4a4ecab87f992fedd345d5dc997f", 0xa5}, {&(0x7f00000000c0)="671e5752b9883dc002a4adadf10d4680505ad4173b79575ec5695f184c16c67b66bea83a437b92b3ac1fc33bbff6b5be9cb42c8d5c567ae10a15332937b21f528871b6ae0df200a2af7ced33a1e69398395541f3ab64f820e3576e5dd7df9d462b24cc2669e0cf9459d85cfac9d416e0ad79853c2e4821ab99428e687b1c37c9", 0x80}, {&(0x7f00000001c0)="d71fb76c3d8f4511f611e4c2ef552f3b484d5dde1a1a076893de8a5c5788d898d5632922ab15ab215656bfb9806553e494bb88ba06240e2de3a9f6974cbd10d10cfa94dda57648939cc23c000350435a9a1c506b7be4513ee02067d1effa6b21e94f3ee44fa78d09ef8bbfe65bb71ea3e3af4b028eda0a77901cb9700cd341c4ff9393a72909d293e56b4539ab7e44c7d165", 0x92}], 0x3}, {0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)='\n', 0x1}, {&(0x7f00000002c0)="676ad1431b784645075f6884fd856f8e766c78fb8c650ec74da1c2cd67ea5c64f04b8b89bd9cfbf9d05c69bd432dfbdb8cc2d654c475ffbb2eeac20ed07c2e4228bf916adcb151dae1cd69d905edd96a00a8f5375779268a4f2d54f20dd792f510066986271016de4cec4151e43c31b9f946cf371739c3f171633bb15ba81dc46469f608bd6ca3b9b0478dd8d3565eac58714d20cf9c05d9b8230c4c8b068f9d", 0xa0}, {&(0x7f00000003c0)="66b295f9626c7270eb286212bc966c69c370d739d46982d7dbc529fa03fb0818e01f7cabead88f723c12b1da7a24ca53fda58110a757e75bc1e0aa2459aa0953a576b8fb5c5550af4ce9ddddb55daa5d6aa7768dcb625b2a165c27f64985c60081afcb80b216b61b0efc8c812558b8b840c0b73808256e871c36862a59436d8a69deb757afdc5e7a4117b6b415e4897b785c", 0x92}], 0x3, &(0x7f00000004c0)=[@iv={0xf8, 0x117, 0x2, 0xdf, "243dab4c522d454a1315c619ad6920f8098e21d603596439e9c8a21ab1f22de430556cac82a4432387ea0398e9c60f2409b1aa8cbf836c5de36832264907839e60a36daee7680639cfdac7b5b1241249ce4994fd5fb710cdef29a1c3111787272a1efe7a2bd3c1521db5287461d382f7232d397f14daad0cb3124cd787cbe88ea8b4855aa494b623d600ff1c4bca7b669aca1b58354b4965f7fa3a83137db71acf939a89724f87f476a8bb2c31fdada7154145fd08ee66910eac9bc6293fff464799a6eeaec1573f3a0f1ebf216824982a1aad6b50e3a1176bfd941dbf9237"}, @assoc={0x18, 0x117, 0x4, 0x80000000}, @assoc={0x18, 0x117, 0x4, 0x100}, @iv={0x48, 0x117, 0x2, 0x2d, "6d78eea5cd3df3b88cf8b8c1ce3ff918eb4deaf77914781d22a265d505bdfe9519cfbcef13249363245b49eb96"}, @assoc={0x18, 0x117, 0x4, 0xff}, @assoc={0x18, 0x117, 0x4, 0x9}, @iv={0x100, 0x117, 0x2, 0xe8, "21105bb2e2b5c4fb22ef1d3fb0edf8cbe68b88dc8bf40e0f7c0a0ef51b7f642bf6a67141e28e9f483aaa3e5bfd44d982e39ce7211a4b77d7261f497aaaa07b7ba4df81612c18f8687bd4c8f9a996dbb3c48e287505fabf2e901b433434c4282b24730c3a73e4e63e53eb63ed3b0fc4f08eaf062cc142e8dfbd9f425123639ef3335a0a8fed25f247e2e39da8c312ae95e5550afa321cd0e27ccc80cc44a3a6fe339bb0ea6fa9ab63841b2b1baf1149f228a340ff5d5314b06759fc8137e7a87ef54e0574309ed8711c6d62a49c1d9f0e9c2953720d179c474fd690992e45f415171fef4601c82aa0"}, @iv={0x88, 0x117, 0x2, 0x71, "e2c4992f313761e814f241c50574da251513efdbfb014ca4401e8f71031af6266b680d9a170e8f9877e869e01e3f9079871d6744a8a74506c9f341a923f3068587521ef13cbd4685957e8ddaf2767ff45270c45e86ec0495f0af3b217b308a5833424cba2c6dd2c4b1b799c57a0dbef850"}], 0x328, 0x24000004}], 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}], 0x1c) [ 401.386132] ================================================================== [ 401.393474] Disabling lock debugging due to kernel taint [ 401.403176] Kernel panic - not syncing: panic_on_warn set ... [ 401.403176] [ 401.410564] CPU: 0 PID: 13326 Comm: syz-executor.5 Tainted: G B 4.14.184-syzkaller #0 [ 401.419657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.429013] Call Trace: [ 401.431606] dump_stack+0x1b2/0x283 [ 401.435242] panic+0x1f9/0x42d [ 401.438449] ? add_taint.cold+0x16/0x16 [ 401.442428] ? preempt_schedule_common+0x4a/0xc0 [ 401.447203] ? btrfs_mount+0x2412/0x2838 [ 401.451270] ? ___preempt_schedule+0x16/0x18 [ 401.455689] ? btrfs_mount+0x2412/0x2838 [ 401.459767] kasan_end_report+0x43/0x49 [ 401.463755] kasan_report.cold+0x12f/0x2b9 [ 401.468001] btrfs_mount+0x2412/0x2838 [ 401.471899] ? _find_next_bit+0xdb/0x100 [ 401.475972] ? pcpu_alloc+0x37d/0xf70 [ 401.479774] ? btrfs_remount+0x10c0/0x10c0 [ 401.484000] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 401.489436] ? rcu_read_lock_sched_held+0x10a/0x130 [ 401.494437] ? pcpu_alloc+0xe1/0xf70 [ 401.498138] ? __lockdep_init_map+0x100/0x560 [ 401.502618] ? __lockdep_init_map+0x100/0x560 [ 401.507103] mount_fs+0x92/0x2a0 [ 401.510458] vfs_kern_mount.part.0+0x5b/0x3c0 [ 401.514940] vfs_kern_mount+0x3c/0x60 [ 401.518725] btrfs_mount+0x2a0/0x2838 [ 401.522510] ? _find_next_bit+0xdb/0x100 [ 401.526555] ? pcpu_alloc+0x37d/0xf70 [ 401.530339] ? btrfs_remount+0x10c0/0x10c0 [ 401.534563] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 401.540000] ? rcu_read_lock_sched_held+0x10a/0x130 [ 401.545002] ? pcpu_alloc+0xe1/0xf70 [ 401.548705] ? pcpu_find_block_fit+0x380/0x380 [ 401.553273] ? __lockdep_init_map+0x100/0x560 [ 401.557753] ? __lockdep_init_map+0x100/0x560 [ 401.562233] mount_fs+0x92/0x2a0 [ 401.565587] vfs_kern_mount.part.0+0x5b/0x3c0 [ 401.570069] do_mount+0x3c9/0x25e0 [ 401.573595] ? copy_mount_string+0x40/0x40 [ 401.577816] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 401.582645] ? copy_mnt_ns+0x8a0/0x8a0 [ 401.586516] ? copy_mount_options+0x1ec/0x2e0 [ 401.590998] ? copy_mnt_ns+0x8a0/0x8a0 [ 401.594871] SyS_mount+0xa8/0x120 [ 401.598314] ? copy_mnt_ns+0x8a0/0x8a0 [ 401.602189] do_syscall_64+0x1d5/0x640 [ 401.606067] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 401.611243] RIP: 0033:0x45f4aa [ 401.614413] RSP: 002b:00007ff8e7b12a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 401.622109] RAX: ffffffffffffffda RBX: 00000000005094e0 RCX: 000000000045f4aa [ 401.629363] RDX: 00007ff8e7b12ae0 RSI: 00000000200001c0 RDI: 00007ff8e7b12b00 [ 401.636619] RBP: 000000000078bf00 R08: 00007ff8e7b12b40 R09: 00007ff8e7b12ae0 [ 401.643891] R10: 0000000000000007 R11: 0000000000000206 R12: 0000000000000003 [ 401.651148] R13: 0000000000000c09 R14: 00000000004ce514 R15: 00007ff8e7b136d4 [ 401.659653] Kernel Offset: disabled [ 401.663277] Rebooting in 86400 seconds..