bilities 04:52:55 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xf]}, 0x63) 04:52:55 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100004c01000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:52:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}]}, 0x2c}}, 0x0) 04:52:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:52:55 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:52:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000fffffff65f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000]}}]}, 0x2c}}, 0x0) 04:52:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000fffffdfc5f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000fffffffe5f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:56 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 996.379701][T19211] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:52:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000fcfdffff5f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 996.501596][T19211] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:52:56 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x10]}, 0x63) 04:52:56 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100006001000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:52:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}}]}, 0x2c}}, 0x0) 04:52:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000f6ffffff5f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:56 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:52:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:52:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}}]}, 0x2c}}, 0x0) 04:52:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000feffffff5f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 997.247953][T19263] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:52:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000200005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:52:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff]}}]}, 0x2c}}, 0x0) 04:52:57 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:52:57 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x11]}, 0x63) 04:52:57 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100006801000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:52:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000300005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff]}}]}, 0x2c}}, 0x0) 04:52:57 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:52:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:52:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000400005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}}]}, 0x2c}}, 0x0) [ 998.226624][T19310] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:52:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000600005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}}]}, 0x2c}}, 0x0) 04:52:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000003005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:58 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) [ 998.435644][T19310] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:52:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:52:58 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x12]}, 0x63) 04:52:58 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:52:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000006005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:58 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100006c01000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:52:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}]}, 0x2c}}, 0x0) [ 999.093388][T19360] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:52:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000003f005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e]}}]}, 0x2c}}, 0x0) 04:52:58 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100007401000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:52:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000002005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000003005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:59 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:52:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) [ 999.409316][T19385] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 999.579323][T19385] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:52:59 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x13]}, 0x63) 04:52:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0]}}]}, 0x2c}}, 0x0) 04:52:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000004005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:52:59 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:52:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:52:59 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100007a01000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:52:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}]}, 0x2c}}, 0x0) 04:52:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000006005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1000.107915][T19418] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:52:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000035f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:00 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:53:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}]}, 0x2c}}, 0x0) [ 1000.349210][T19418] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:00 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x14]}, 0x63) 04:53:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000065f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:00 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000003000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}]}, 0x2c}}, 0x0) 04:53:00 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:53:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000010000000000003f5f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1001.110530][T19471] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}]}, 0x2c}}, 0x0) 04:53:00 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 1001.220831][T19471] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000025f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}]}, 0x2c}}, 0x0) 04:53:01 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x15]}, 0x63) 04:53:01 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000005000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000035f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}]}, 0x2c}}, 0x0) 04:53:01 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628a", 0x67, 0x10000}], 0x0, 0x0) 04:53:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}]}, 0x2c}}, 0x0) 04:53:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000045f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1002.049051][T19525] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1002.145833][T19525] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}]}, 0x2c}}, 0x0) 04:53:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000065f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:02 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000006000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1002.254654][T19526] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 756082810144684242 /dev/loop5 [ 1002.512937][T19561] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1002.605138][T19561] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:02 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x18]}, 0x63) 04:53:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0c01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}]}, 0x2c}}, 0x0) 04:53:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd9", 0x6c, 0x10000}], 0x0, 0x0) 04:53:02 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628a", 0x67, 0x10000}], 0x0, 0x0) 04:53:02 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000007000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1003.050319][T19579] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a02e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}]}, 0x2c}}, 0x0) 04:53:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a03e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:02 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000000a000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1003.177871][T19584] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop1 new:/dev/loop5 04:53:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}]}, 0x2c}}, 0x0) 04:53:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a05e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1003.387286][T19610] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1003.478071][T19610] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:03 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x300]}, 0x63) 04:53:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd9", 0x6c, 0x10000}], 0x0, 0x0) 04:53:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}]}, 0x2c}}, 0x0) 04:53:03 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628a", 0x67, 0x10000}], 0x0, 0x0) 04:53:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a0ce2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:03 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000000f000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a0fe2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1003.989013][T19631] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}]}, 0x2c}}, 0x0) 04:53:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e0c1383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:03 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e9638", 0x9b, 0x10000}], 0x0, 0x0) [ 1004.141396][T19631] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb6518628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}]}, 0x2c}}, 0x0) 04:53:04 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x500]}, 0x63) 04:53:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xfdef, 0x10000}], 0x0, 0x0) 04:53:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd9", 0x6c, 0x10000}], 0x0, 0x0) 04:53:04 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000014000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}]}, 0x2c}}, 0x0) 04:53:04 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e9638", 0x9b, 0x10000}], 0x0, 0x0) 04:53:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}]}, 0x2c}}, 0x0) 04:53:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0x2000098a, 0x10000}], 0x0, 0x0) [ 1004.982931][T19680] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1005.101034][T19680] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}]}, 0x2c}}, 0x0) 04:53:04 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e9638", 0x9b, 0x10000}], 0x0, 0x0) 04:53:04 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000427000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}}]}, 0x2c}}, 0x0) [ 1005.453060][T19712] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1005.542990][T19712] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:05 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x600]}, 0x63) 04:53:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec", 0xa2, 0x10000}], 0x0, 0x0) 04:53:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}}]}, 0x2c}}, 0x0) 04:53:05 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6", 0xb5, 0x10000}], 0x0, 0x0) 04:53:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xfffffdef, 0x10000}], 0x0, 0x0) 04:53:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000429000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105000000000000]}}]}, 0x2c}}, 0x0) [ 1005.942940][T19737] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:05 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6", 0xb5, 0x10000}], 0x0, 0x0) 04:53:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000042a000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec", 0xa2, 0x10000}], 0x0, 0x0) 04:53:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}]}, 0x2c}}, 0x0) 04:53:06 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6", 0xb5, 0x10000}], 0x0, 0x0) [ 1006.320412][T19762] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1006.441986][T19762] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1006.558759][T19779] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop1 new:/dev/loop5 04:53:06 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x700]}, 0x63) 04:53:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xfffffffffffffdef, 0x10000}], 0x0, 0x0) 04:53:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}]}, 0x2c}}, 0x0) 04:53:06 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000262c000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:06 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9", 0xc2, 0x10000}], 0x0, 0x0) 04:53:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec", 0xa2, 0x10000}], 0x0, 0x0) 04:53:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558000000000000]}}]}, 0x2c}}, 0x0) [ 1006.934992][T19799] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1007.028900][T19799] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}}]}, 0x2c}}, 0x0) 04:53:06 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9", 0xc2, 0x10000}], 0x0, 0x0) 04:53:06 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000003f000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0", 0xbd, 0x10000}], 0x0, 0x0) 04:53:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}}]}, 0x2c}}, 0x0) [ 1007.303279][T19826] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1007.428883][T19826] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:07 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x900]}, 0x63) 04:53:07 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9", 0xc2, 0x10000}], 0x0, 0x0) 04:53:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10002}], 0x0, 0x0) 04:53:07 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000040000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000]}}]}, 0x2c}}, 0x0) 04:53:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0", 0xbd, 0x10000}], 0x0, 0x0) 04:53:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}}]}, 0x2c}}, 0x0) 04:53:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10003}], 0x0, 0x0) [ 1007.857249][T19857] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:07 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10004}], 0x0, 0x0) 04:53:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}, 0x2c}}, 0x0) 04:53:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0", 0xbd, 0x10000}], 0x0, 0x0) [ 1008.047527][T19857] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:08 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xa00]}, 0x63) 04:53:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10006}], 0x0, 0x0) 04:53:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}]}, 0x2c}}, 0x0) 04:53:08 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000060000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:08 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 04:53:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}]}, 0x2c}}, 0x0) 04:53:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10300}], 0x0, 0x0) [ 1008.773730][T19908] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 5585 transid 756082810144684242 /dev/loop1 [ 1008.815471][T19917] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:08 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1008.857650][T19908] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1008.878947][T19908] BTRFS error (device loop1): superblock checksum mismatch [ 1008.913063][T19917] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:08 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000466000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1008.963449][T19908] BTRFS error (device loop1): open_ctree failed 04:53:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10600}], 0x0, 0x0) 04:53:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}]}, 0x2c}}, 0x0) [ 1009.145885][T19944] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1009.251982][T19944] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:09 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xb00]}, 0x63) 04:53:09 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 04:53:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 04:53:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x13f00}], 0x0, 0x0) 04:53:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}]}, 0x2c}}, 0x0) 04:53:09 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000467000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}]}, 0x2c}}, 0x0) 04:53:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x3000000}], 0x0, 0x0) [ 1009.773383][T19966] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 04:53:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}]}, 0x2c}}, 0x0) 04:53:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x4000000}], 0x0, 0x0) [ 1009.882491][T19970] BTRFS error (device loop1): superblock checksum mismatch [ 1009.907199][T19966] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1009.972041][T19970] BTRFS error (device loop1): open_ctree failed 04:53:09 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000468000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1010.290078][T20005] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1010.345665][T20005] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:10 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xc00]}, 0x63) 04:53:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}]}, 0x2c}}, 0x0) 04:53:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x8800000}], 0x0, 0x0) 04:53:10 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 04:53:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 04:53:10 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000469000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x7fffffffffffffff}], 0x0, 0x0) [ 1010.756128][T20021] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}]}, 0x2c}}, 0x0) [ 1010.814271][T20023] BTRFS error (device loop1): superblock checksum mismatch [ 1010.834139][T20023] BTRFS error (device loop1): open_ctree failed 04:53:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x2, 0x0) 04:53:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}]}, 0x2c}}, 0x0) [ 1010.883729][T20021] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1010.887953][T20020] BTRFS error (device loop1): superblock checksum mismatch [ 1010.922840][T20020] BTRFS error (device loop1): open_ctree failed 04:53:10 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000046a000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:10 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) [ 1011.146463][T20057] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1011.237215][T20056] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1011.254302][T20056] BTRFS error (device loop5): superblock checksum mismatch [ 1011.281982][T20056] BTRFS error (device loop5): open_ctree failed [ 1011.288666][T20057] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:11 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xd00]}, 0x63) 04:53:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x3, 0x0) 04:53:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}]}, 0x2c}}, 0x0) 04:53:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) 04:53:11 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000046b000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:11 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x4, 0x0) [ 1011.761342][T20081] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}]}, 0x2c}}, 0x0) 04:53:11 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000046c000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) 04:53:11 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x6, 0x0) [ 1012.057985][T20106] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1012.242349][T20106] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x300, 0x0) 04:53:12 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xe00]}, 0x63) 04:53:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}]}, 0x2c}}, 0x0) 04:53:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) 04:53:12 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000046d000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:12 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}]}, 0x2c}}, 0x0) 04:53:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x600, 0x0) [ 1012.744913][T20138] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x3f00, 0x0) 04:53:12 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000046e000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:12 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}}]}, 0x2c}}, 0x0) 04:53:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1013.017041][T20163] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1013.173301][T20163] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1013.190816][T20172] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 209 transid 756082810144684242 /dev/loop5 [ 1013.359048][T20175] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1013.370631][T20175] BTRFS error (device loop1): superblock checksum mismatch [ 1013.381351][T20175] BTRFS error (device loop1): open_ctree failed [ 1013.403491][T20172] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1013.413015][T20172] BTRFS error (device loop1): superblock checksum mismatch [ 1013.433547][T20172] BTRFS error (device loop1): open_ctree failed 04:53:13 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xf00]}, 0x63) 04:53:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}]}, 0x2c}}, 0x0) 04:53:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x20000, 0x0) 04:53:13 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000046f000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) 04:53:13 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 04:53:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}]}, 0x2c}}, 0x0) 04:53:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x1000000, 0x0) [ 1013.780734][T20196] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:13 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 04:53:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}}]}, 0x2c}}, 0x0) 04:53:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x2000000, 0x0) [ 1013.902719][T20196] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:13 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000470000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1014.201739][T20233] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1014.278315][T20233] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:14 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1100]}, 0x63) 04:53:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) 04:53:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}}]}, 0x2c}}, 0x0) 04:53:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x3000000, 0x0) 04:53:14 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 04:53:14 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000481000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1014.726779][T20251] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x4000000, 0x0) 04:53:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}]}, 0x2c}}, 0x0) 04:53:14 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca}], 0x0, 0x0) 04:53:14 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000386000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x6000000, 0x0) 04:53:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) [ 1015.011135][T20279] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1015.185651][T20279] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:15 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1200]}, 0x63) 04:53:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}}]}, 0x2c}}, 0x0) 04:53:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x3f000000, 0x0) 04:53:15 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca}], 0x0, 0x0) 04:53:15 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000002000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 04:53:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}]}, 0x2c}}, 0x0) [ 1015.762156][T20306] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xf6ffffff, 0x0) 04:53:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xfcfdffff, 0x0) 04:53:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}]}, 0x2c}}, 0x0) 04:53:15 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca}], 0x0, 0x0) 04:53:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) [ 1015.976810][T20306] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:16 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1300]}, 0x63) 04:53:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xfeffffff, 0x0) 04:53:16 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000003000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x521]}}]}, 0x2c}}, 0x0) 04:53:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) 04:53:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 04:53:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xfffffdfc, 0x0) [ 1016.795481][T20361] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xfffffff6, 0x0) 04:53:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}]}, 0x2c}}, 0x0) 04:53:16 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xfffffffe, 0x0) 04:53:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8}], 0x0, 0x0) 04:53:17 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000004000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:17 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1400]}, 0x63) 04:53:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x20000000000, 0x0) 04:53:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}]}, 0x2c}}, 0x0) 04:53:17 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8}], 0x0, 0x0) [ 1017.675486][T20410] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x1000000000000, 0x0) 04:53:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}]}, 0x2c}}, 0x0) 04:53:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8}], 0x0, 0x0) [ 1017.853351][T20410] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x100000000000000, 0x0) 04:53:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}}]}, 0x2c}}, 0x0) 04:53:17 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:17 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000005000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1018.219898][T20454] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1018.316964][T20454] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:18 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1500]}, 0x63) 04:53:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x200000000000000, 0x0) 04:53:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}]}, 0x2c}}, 0x0) 04:53:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 04:53:18 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:18 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000006000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x300000000000000, 0x0) 04:53:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}]}, 0x2c}}, 0x0) [ 1018.725867][T20477] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x400000000000000, 0x0) 04:53:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}}]}, 0x2c}}, 0x0) 04:53:18 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x600000000000000, 0x0) [ 1018.908427][T20477] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:19 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1800]}, 0x63) 04:53:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 04:53:19 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000007000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x3f00000000000000, 0x0) 04:53:19 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}]}, 0x2c}}, 0x0) [ 1019.705897][T20522] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x8000000000000000, 0x0) 04:53:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}}]}, 0x2c}}, 0x0) 04:53:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xf6ffffff00000000, 0x0) 04:53:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300]}}]}, 0x2c}}, 0x0) [ 1019.941345][T20522] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 04:53:20 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x4000]}, 0x63) 04:53:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xfcfdffff00000000, 0x0) 04:53:20 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000000a000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105]}}]}, 0x2c}}, 0x0) 04:53:20 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:20 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 04:53:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}]}, 0x2c}}, 0x0) 04:53:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xfeffffff00000000, 0x0) [ 1020.754921][T20582] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1020.785153][T20577] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 5585 transid 756082810144684242 /dev/loop1 04:53:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xffffffff00000000, 0x0) 04:53:20 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:20 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000000f000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1020.911429][T20577] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1020.961583][T20577] BTRFS error (device loop1): superblock checksum mismatch 04:53:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5865]}}]}, 0x2c}}, 0x0) [ 1021.005245][T20577] BTRFS error (device loop1): open_ctree failed [ 1021.086966][T20609] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1021.222173][T20609] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:21 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1000000]}, 0x63) 04:53:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0xffffffffffffffff, 0x0) 04:53:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}]}, 0x2c}}, 0x0) 04:53:21 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:21 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 04:53:21 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000010000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558]}}]}, 0x2c}}, 0x0) [ 1021.776701][T20638] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1021.799425][T20634] BTRFS error (device loop1): unsupported checksum algorithm 22813 04:53:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaab09, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1021.820513][T20634] BTRFS error (device loop1): superblock checksum mismatch 04:53:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}}]}, 0x2c}}, 0x0) [ 1021.949742][T20634] BTRFS error (device loop1): open_ctree failed [ 1021.964880][T20638] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:21 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x301000, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000100)=0x20, 0xfffffffffffffe90) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000040)=0x8) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000080)=[0x5, 0xfffffffffffffffa]) 04:53:21 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000014000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1022.190936][T20688] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1022.295691][T20688] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:22 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x2000000]}, 0x63) 04:53:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}}]}, 0x2c}}, 0x0) 04:53:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 04:53:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) geteuid() 04:53:22 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000060000000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:53:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}]}, 0x2c}}, 0x0) 04:53:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1022.798317][T20797] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:22 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200000, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r3 = getuid() r4 = fcntl$getown(r0, 0x9) r5 = getpid() r6 = getpid() getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000024c0)={0x0}, &(0x7f0000002500)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002540)={r7, 0x5}, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xe8) getresgid(&(0x7f0000000800), &(0x7f0000000840)=0x0, &(0x7f0000000880)) sendmsg$netlink(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000002580)=ANY=[@ANYBLOB="ac0200002a00000827bd7000fddbdf255cd6979420b86c247e661fa2143bdd636358b43f6ce563a0640d42b3ccd5c7bd6aaaef38ce86d5a7c1e9d4d9495965a7a85df3486876273a90a10847ec9b8c65c69ad9919f78667baf86fe8e6a5ecd1f7c3552f9c4ba89d36799ff7c4267bbf743869f0c048af45434e01c62bb1052e3227954e0818e2b65a3d3c7dc0111bedeaf53e4a4670c8aa92172465c74d11766d006d213e003f95759fc4c77195136e07ffd8183cb2001660008003500", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="14001d00ff0200000000000000000000000000015ac33967ccd0d5a987399ac0f178b92ca39421caeb32c8d24b64d7f7add6718d437e24730e7ab1d983f9ff57b5df4913f8d9d5f34b0ed345fa706fab35f2e3b87fb4988d7d595b09c1be97340899fab3654eae1de63c83baa91cf67d01610dc885b32eecd0ca43437ca7ae167508ef91d56b3b9f948f7b0f6f8fab93732254f249b862295a26e36c34a8367ef95ce81169663dadaed76080bc10500a985ad00e4ff3bb33196d7c58980f934c33d1f13c81b6e1c060eaa39e000000"], 0x2ac}, {&(0x7f00000009c0)={0x1350, 0x2c, 0x801, 0x70bd29, 0x25dfdbfd, "", [@nested={0xc4, 0x59, [@generic="f533f13d80d89fbae152117ec566a1292d6afcec14d7d158159faeacc1cf7f8ccbb992bcc3a92105e7566fc943039c43d4180c0ef3b4c80747f524a1d8b733bd717e5c6fa06ecf04eda71f241329b9ea18d5c84a03241451dade7c41136cd3923c5f0785ffbffa178ceb1f76bcabc1400eaa2a9b77c791dd31ad42d03456a8623eb2a902b1e9f7c02dcfdc30fd76837f1c60619ad1b97ba61ab07af0c00009b7a5cf597211200d2fdd788cd4103b12ff70", @typed={0xc, 0x82, @u64=0x7}]}, @typed={0x4, 0x1b}, @generic="cc485fd7602dc31e7d3da30f218df811da88af63e0c64c378aad74c1c4a25d4dadefc4833f772af8ceb7609e018f99362382c7699317c224d5c2358d43f0f94da8d4cc2d4f2d5c5012d6e218871944d1bd148b6a46916e8ebe9c4c5b58e21212f33d2bd63f54ea0396cc528f615ea8e3182701d667cd64a7ba682c88c8808be0474351f2dd98986508893b411272152cc8f1df0995ce09201fdab5e8dcc7f111bee9274ff9d6e959b37e762b768de5a92e166efba8db7a0045ff012b9d22", @generic="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", @generic="cb17bf8b40cd057a07e364f765a01b1b13c8760f2bba80acd861c0e647836603da56146c029ff63eb5c8dbe27e0ff9f258bbba693b4f5e91b679e845f35631c1584f3cd5938d5cda79de3e0f717c15f1a7c4b21cd10af2358ce0ff42bd8525ac184c7ff92dcc011f8ff87253265d24e32149b9a0279a4b68f48c1719c0fd3aaa49abd0fbb3f61a0e997ef784295746baec96e78a5dafd0e97f13113b5af5a7420a", @typed={0x14, 0x54, @str='securitywlan0^\x00'}, @generic="52076d5f2e71dd8221bd2fc4d727c5c80a77af2d160dcdb911ca65f6bc9e30be28fa81bd5466368e8b6b9124b229eca61cd111db3ea2b09ae52aa4620e380b909fadbe62b2b6e024fad47e06c5f27cb48a8c3d04c3bfc1e4f49b040e60a188def583d762b84eab08909cfce96fece9acef0a840430995bda1aa8359d1ee80dfdea7c050a08a7d3f306878b74e16be1666d67a08494605eaf5d7cae46d056e95c1fe190af2002e9e7ad9cbfb521d02734c4b8b1ee39b86b4e2e4bd2c683c2ae8194010c2ca5c681a96dc8e9bfb3ea196763540d2880", @generic="699f3cc016eb019166ff73e3d15d20a84405d660396b9138d3d3498eb35873d5c314a1434b7c5bebede9c5ca57"]}, 0x1350}, {&(0x7f0000001d40)={0x618, 0x1f, 0x502, 0x70bd29, 0x25dfdbfb, "", [@nested={0x15c, 0x82, [@generic="f5575b1e065db7f13881d33d314a2e8a70b28842fc9f32ede3bb45b10a9b2e6ebd61bc909e7c5f0b4ccbe21134d96ea2128a646048b0075f9808e09e9ac2e1179206a2a4c8d6c452fafcf223cffa7e32f1cf52e2907e395276aa400c8280a0272053404a77a26f63f0bd59ee6caa07888c424fac1feaf02b82284db4bae0c1c0fdacc3e879f912671d6b8d82910d7b481eb5c890cdd750ce42117c4b9d91ffa4fbff856080eae5bd267a752cd25e5aba86cf81cf5e0cc1f7fc163af5291003e314658a960f3d7a4ff7", @typed={0x14, 0xc, @ipv6=@remote}, @generic="028f16c0d343efae124b0da9eca0674f8c9da89268c8477bcd639b243201b4431901029e17feebbf137509dbc5e50fb8c5d423af039e63e556887138622fe0d80a0440085e6c13d14b437e0dc02ba8cd1c2b91fb26cb875da39bceecd29912bf3a8ecf23f3a7da3e511dcf28", @typed={0xc, 0x8a, @str='btrfs\x00'}]}, @nested={0x294, 0x93, [@typed={0xf0, 0x17, @binary="cb8f0e3072037d76a8deb484e24b9c212d5f8ad20a206e7277ee69b6afd5a3f636458d4f0111901486f439e3cad692af649923b6fb6ff109950f518c57772f8118ff4c4f4e246be780866c60fa8a49880d05ae04a658538772713108e5579340c6fb3e1b2fdf7ebb886f3dcd6d235149f293923567747dbcda390419dc144e2f8ca84832ae124e06b8d556998281c583b01f77b26f6d4ad417765c5b7c8130abd0db8b1b46692e1ee255c2198a198f51be8759da38e68e54bd9c355d1a94d637b8a0172591d504a4edac488c85b95801bb100dd5bb6f90ab29469fcd2b88d8edbd1c8324d01aff1ea8ca0c4f"}, @typed={0x8, 0x8c, @uid=r3}, @generic="a5500eef8db2ba30057436ea467ad74aea572af8773b4297726fa3af648c99fa36ede7ca90ebc04662a89dcd7dc3ba4bc7e3af119949cff1af49c298741efc1981649873c7f6a0c55bc345b55b900b43b02771adb40acf9f31dfa3a43af630ac6d7c0ae9af2d58ee4e1efbc2eb632e8bf652019bc8523d8ec74fca6ee60b988b812804130aef40561ee06d9024f7a4929b6e22ca77aa5d11c27cea9ed4fae6d3e52012c427ac1efc13f0582f923ef1d2884fe08a6656ab0ceaa475ef15df6cfd0eb32a9335d3ede371482309a3b4a722778568cd90b195be2568410733036c1b", @typed={0x8, 0x24, @pid=r4}, @typed={0x8, 0x4d, @u32=0xb6}, @generic="6e0a4dbb055f7d6013d0eff37f09366578ffeb1c5fe64c41ef878335b6fe29753bf64902c21b3cc0dbf587c0c5bd4a8a665ed792e07568d85c4ce7adf3a121002f68726724c9a43d05c972a32bde2855d69cde0d9e8e18870ad23d31227a143c3dc33b42a3ae554c83ee7b13f7099e38483a00630fbc9072b15519dd61994938e055a13ea0586451631fee626213d768ac2ea63bc50fea039f7583fc09caef3bcac3f9ac35"]}, @generic="25405be15d2ea920cad6b0c5556678cba1c346d7291c90a685a572daec6960fe5f53acd92060fd1c26c7085457ee05fe42a7cd8337c6b5f475d9e444d1736ffadc8a9def9c95f81989c37b2967c1f7d693a52d5589c61fd482db74871f54a3406ee3c5f33cdc54ab2cc7", @nested={0xe4, 0x79, [@generic, @typed={0x8, 0x66, @u32=0xf2c6}, @generic="7252c66606", @typed={0x8, 0x9, @u32=0xb9}, @typed={0x8, 0xe, @fd=r0}, @generic="2bbf08517ef5a918f339ceb50891cde381d4785e02e11c27884c728b787f5aaeb1465ebad81de8b101dfd42e230980630bad8a0d366ba1e0c110abe281b047518862f0d86f603970c7fb879f5f4cf301fe0ac44693abb834237a78a4459a622b8bd9d29e6155ecc85d6818584e23c5fee35029642fcf4f3d292bb759f8c333392ab6d84709f8df2e012573080c661d2635c57f29f5e73a69f159912c9ed2eaa7c1bb1243f4c35d8210af591fc5a8c08e1ac0f189158477b6a56951852b2de75e2c94"]}, @typed={0x8, 0x8c, @pid=r5}, @typed={0x8, 0x84, @u32=0x9}, @generic="4e49e5336cbe3e5a52e37d57794bad3f42432831700f37e08259264d45fb61e8a0a82c0bf8b4bd0c8ce801c829082dbfe28d22a91f1c226ee829212a9e46b5f3ad2dc9ce1668e58616d326b1c1ad81c2821cc9ee073aaf60ddae6f4b693b8dfa9b61d87485e65a1d189481e311da4bf4176c1b2c9ff5a1e203654ff0515d3c3d5a918f1792ce18d0dcdbae37b7b56780dc05d9e125568ddd69e4d2", @typed={0x8, 0x4d, @pid=r6}, @typed={0x14, 0x77, @ipv6=@mcast1}]}, 0x618}, {&(0x7f0000000440)={0xac, 0x10, 0x0, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x8, 0x4d, @ipv4=@multicast1}, @generic="8c924d5c5ba1d2350fd72a9d08d4c88d93a30cccb40134a5839651866e0245d3c3dffebc28a36c45e498aa85df1fbd542d4848db4aef787570030f2969a9041f0703b465350c1f4521c7d6d570bffccf4b679882ffc8c5557356d012458420d5e31c655078707e611aa3d6d9709f915309049ff88e05e1259647f64ec7f46f90540eb57214264c1b54102510a249416c86284f"]}, 0xac}, {&(0x7f0000000580)={0x50, 0x3b, 0x400, 0x70bd26, 0x25dfdbfc, "", [@typed={0x8, 0x55, @uid=r8}, @typed={0xc, 0x2d, @u64=0x401}, @generic="6ec18254e648f6ec8a358267779ca068223dc879ed6c2ab3a1eefa665bca57ad07beac85daf552c30a"]}, 0x50}], 0x5, &(0x7f0000002380)=[@cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x20, 0x40}, 0x48040) fcntl$getflags(r0, 0x40b) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0xfffd}], 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000002400)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000002440)={0x0, 0x0, 0xb4b}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000002480)={r12, r13}) 04:53:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}]}, 0x2c}}, 0x0) [ 1022.908241][T20793] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1022.922686][T20793] BTRFS error (device loop1): superblock checksum mismatch [ 1022.983916][T20793] BTRFS error (device loop1): open_ctree failed 04:53:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:53:22 executing program 0: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0xffffffffffff8001}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r1, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x400, 0x1, 0x9, 0x4, 0x6}, &(0x7f00000002c0)=0x98) write$vhci(r0, &(0x7f0000000200)=@HCI_EVENT_PKT={0x4, "958d8ab384da268e3d4821694ccc0eb2e99412699a789e8ee253c12f1e9efe84808133aea033f942c99f26814674e3c76464b5027060c2c9a5726ebf1eb143235200820481261604095024734d8bb84a6c800cfeba5c4ce24dacbe06d9f5270be4321ddad3da50210870af9cb13edba12877e70ea595b2f71f5f581310c550fbe00230b62a44b4f0"}, 0x32) 04:53:23 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x3000000]}, 0x63) 04:53:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}}]}, 0x2c}}, 0x0) 04:53:23 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000000030000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 04:53:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:53:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 04:53:23 executing program 0: lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10003}], 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) fcntl$notify(r0, 0x402, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1b, 0x0, &(0x7f00000002c0), &(0x7f0000000300)='GPL\x00', 0x10000, 0x54, &(0x7f0000000340)=""/84, 0x0, 0xb3e6a45ef71ea09, [], r1, 0xb}, 0x48) 04:53:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}]}, 0x2c}}, 0x0) [ 1023.781294][T21044] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1023.837969][T21047] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1023.874281][T21047] BTRFS error (device loop1): superblock checksum mismatch 04:53:23 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000086030000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1023.924764][T21047] BTRFS error (device loop1): open_ctree failed 04:53:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}]}, 0x2c}}, 0x0) 04:53:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, &(0x7f0000000400), 0x3, 0x0) [ 1024.161512][T21175] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:24 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x4000000]}, 0x63) 04:53:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:53:24 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000027040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xfffffffffffffd12, 0x10000}], 0x0, 0x0) semget$private(0x0, 0x3, 0x400) 04:53:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}]}, 0x2c}}, 0x0) 04:53:24 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9", 0xc2, 0x10000}], 0x0, 0x0) 04:53:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}]}, 0x2c}}, 0x0) [ 1024.795395][T21195] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) [ 1024.871750][T21196] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 756082810144684242 /dev/loop1 04:53:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}]}, 0x2c}}, 0x0) 04:53:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec", 0xa2, 0x10000}], 0x0, 0x0) [ 1024.969837][T21195] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000040)) 04:53:24 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000029040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1025.284043][T21420] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1025.346397][T21420] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:25 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x5000000]}, 0x63) 04:53:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}]}, 0x2c}}, 0x0) 04:53:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:53:25 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) write$input_event(r0, &(0x7f0000000040)={{0x0, 0x2710}, 0x16, 0x100000000}, 0x18) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:25 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000002a040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec", 0xa2, 0x10000}], 0x0, 0x0) 04:53:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:53:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}]}, 0x2c}}, 0x0) 04:53:25 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4100, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r1 = accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername(r1, &(0x7f0000000640)=@in={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x80) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x87, @multicast2, 0x4e22, 0x2, 'lblc\x00', 0x1, 0x7, 0x7}, 0x2c) [ 1025.898653][T21516] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:25 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e9638", 0x9b, 0x10000}], 0x0, 0x0) 04:53:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}]}, 0x2c}}, 0x0) [ 1025.984440][T21574] IPVS: set_ctl: invalid protocol: 135 224.0.0.2:20002 [ 1026.019763][T21516] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:53:26 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x6000000]}, 0x63) 04:53:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}]}, 0x2c}}, 0x0) 04:53:26 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000066040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:26 executing program 0: r0 = dup(0xffffffffffffff9c) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) syz_mount_image$minix(&(0x7f0000000100)='minix\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x8, &(0x7f0000000700)=[{&(0x7f0000000180)="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", 0xfa, 0x400}, {&(0x7f0000000280)="0f983e43b4362d830c60dd1fba2cf3aaeb8310b28150a9a110f7fd542735341d473acc51d40a2efad5036ed96ce0bd621fe55a9ba5bfb11ff0075ec8220e3dcd8e84a8cc99f39fc41adea03a024cb5f400f1b0c75608436f58138889439d31b232d80b989deb19cb222282e753589146c9c2baaab4a00c747bea5030af77426140c0f30595e54fbc341b9f36a807340a530fec7d131b18", 0x97, 0x401}, {&(0x7f0000000340)="aa6179ff6d1d94a74b29e35f61f7e7ce01afaa0efa23d63fe5d260efcc941be8e2f543c6173fa80fb955d451377691a6ad3961", 0x33, 0x7}, {&(0x7f0000000380)="303849cb83a13f3516cc5ea97850076eb5d71f48d6120d47652f5b2dd217e3", 0x1f, 0x4}, {&(0x7f00000003c0)="b0bd3df71bbc6eff74821aa586e9cd4ff2bc6aa40d4e9af3cb1775bf329ee37d98a05eb22528f9f1ba7126169048c2423af518b04a0e5a4e06583d05752251dcec2fe994903ce39f3fcb6989125ddc90569bc0cfd9c0d6c1602eb49b69bc842d72d1034165a0e21e556cea3ae250e15fb5299628e56ffa2ad03a69c941f21bea112ad1a8fb6587a1d8e9ce914ee1a987342f9b6949b6064cd6905142b3d13e7543ffa3ddefd950a7b7021079550c0410b1cb34997ff340a7999dae850477303f6318f9354ca407adf753d4cf64a709105b712720bac1dbbac4277999d322f96d39cf3a15ae60", 0xe6, 0x1ff}, {&(0x7f00000004c0)="f0cc538740bf201d8057e5756bcbb0df305737b5573c6da4a82216d3ce6bc44b1f396af5806674567a200c7d1a8680f556487fe5b207c8f320ec3842047d0c952977a5e3edea5f002fadf2a34aea7f3a6dfdb3c16e2214ec67c93f3811ffbaae2d88d28b62cf01123ffae29c613c64f4eb2994de75060743e2223d4d6ec85c6670b1838385910e42f21552c0126f176d2899827b6a33146ad02d3e14d6a9ff553bcf6bc57668ad8578a837b1f09f8caf370cddfc345ce87a202a77ca538f69c53e67f3c7f9e63349a8ba408c531786bf36e9bc64d18598be62ca1c8502de96befa011dc2add658188297", 0xea, 0x4}, {&(0x7f00000005c0)="d14e76bc06097e0fd5635d21a0082c4c7d264d4d31c6984b8e9877dff2331e95524552f55d54c868a93b45d762b37ee0e00245af7b12ac8a7a8306a06387ac2d147c310cbf0f840fcff5", 0x4a, 0x3}, {&(0x7f0000000640)="aa21a1cc10955a401d708bcf00add55f8e71429762b0079e62c9c393c09247b462e21d9bf52cd0de6aaf1eaa89a05eeac5caa71e3d0086c21587224b09b3e7a79339ebc3a0fb0ff998fd800dabdaff110f36a8ad8bfffd633c69515b3159a81eb133c5798d6271296b4489f8fbdb416ab90055b24c4cc44312c1c44d7c1d05d2ccadd5f433aada4ede1233101496380f", 0x90, 0xffffffff}], 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) 04:53:26 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628a", 0x67, 0x10000}], 0x0, 0x0) 04:53:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:53:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}}]}, 0x2c}}, 0x0) [ 1026.773738][T21704] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) sysfs$3(0x3) 04:53:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd9", 0x6c, 0x10000}], 0x0, 0x0) [ 1026.902340][T21704] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}]}, 0x2c}}, 0x0) 04:53:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x158, 0x10000}], 0x0, 0x0) 04:53:27 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x7000000]}, 0x63) 04:53:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:27 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000067040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}]}, 0x2c}}, 0x0) 04:53:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x10001, 0x44400) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000040)={0x0, 0x0, {0x1, 0x10001, 0x100, 0xc4f}}) 04:53:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}]}, 0x2c}}, 0x0) [ 1027.683570][T21858] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}}]}, 0x2c}}, 0x0) 04:53:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}]}, 0x2c}}, 0x0) 04:53:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x0, &(0x7f0000000400), 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x80000) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000200)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') 04:53:27 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000068040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1027.809266][T21858] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}]}, 0x2c}}, 0x0) [ 1028.161613][T22095] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1028.206531][T22095] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:28 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x8000000]}, 0x63) 04:53:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:53:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) 04:53:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}]}, 0x2c}}, 0x0) 04:53:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x0, &(0x7f0000000000), 0x4, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0xe6fb4a8856ae4ca0, 0x1, 0x3}, 0xcb7}}, 0x18) 04:53:28 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000069040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}}]}, 0x2c}}, 0x0) [ 1028.676770][T22113] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1028.746937][T22115] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 17487635432702809553 transid 756082810144684242 /dev/loop1 04:53:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:28 executing program 0: 04:53:28 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000006a040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1028.857920][T22115] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1028.889234][T22115] BTRFS error (device loop1): superblock checksum mismatch 04:53:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13000000]}}]}, 0x2c}}, 0x0) [ 1028.929502][T22115] BTRFS error (device loop1): open_ctree failed 04:53:28 executing program 0: prctl$PR_CAPBSET_READ(0x17, 0xc) [ 1029.042469][T22235] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:29 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x9000000]}, 0x63) 04:53:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:53:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21050000]}}]}, 0x2c}}, 0x0) 04:53:29 executing program 0: 04:53:29 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000006b040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000004, r0) 04:53:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}]}, 0x2c}}, 0x0) [ 1029.708879][T22260] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:29 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000006c040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}]}, 0x2c}}, 0x0) [ 1029.926868][T22263] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1029.957558][T22263] BTRFS error (device loop1): superblock checksum mismatch 04:53:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x101000) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x8) [ 1029.993866][T22263] BTRFS error (device loop1): open_ctree failed [ 1030.004815][T22387] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1030.172702][T22387] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:30 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xa000000]}, 0x63) 04:53:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000]}}]}, 0x2c}}, 0x0) 04:53:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000", 0x32, 0x10000}], 0x0, 0x0) 04:53:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x2c13, 0x101000) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000240)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1ff, 0x101201) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x200, 0x4, 0x1, 0x200, 0x10}, 0x98) 04:53:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:53:30 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000006d040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}}]}, 0x2c}}, 0x0) [ 1030.785148][T22519] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:30 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) getgroups(0x0, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000", 0x32, 0x10000}], 0x0, 0x0) [ 1030.870352][T22516] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1030.908773][T22519] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}}]}, 0x2c}}, 0x0) [ 1030.927241][T22516] BTRFS error (device loop1): superblock checksum mismatch 04:53:30 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000006e040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1031.013583][T22516] BTRFS error (device loop1): open_ctree failed 04:53:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff]}}]}, 0x2c}}, 0x0) [ 1031.247712][T22753] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1031.327149][T22753] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:31 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xb000000]}, 0x63) 04:53:31 executing program 0: socket$bt_cmtp(0x1f, 0x3, 0x5) 04:53:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:53:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000", 0x32, 0x10000}], 0x0, 0x0) 04:53:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff]}}]}, 0x2c}}, 0x0) 04:53:31 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000006f040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa2000, 0x0) getpeername$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2040, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) 04:53:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}}]}, 0x2c}}, 0x0) [ 1031.661621][T22778] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873", 0x4b, 0x10000}], 0x0, 0x0) 04:53:31 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000070040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000040), 0x4) 04:53:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}}]}, 0x2c}}, 0x0) [ 1031.857949][T22776] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1031.890316][T22776] BTRFS error (device loop1): superblock checksum mismatch [ 1031.941178][T22776] BTRFS error (device loop1): open_ctree failed [ 1031.962589][T22902] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1032.091894][T22902] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:32 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xc000000]}, 0x63) 04:53:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}]}, 0x2c}}, 0x0) 04:53:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:53:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000", 0x32, 0x10000}], 0x0, 0x0) 04:53:32 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000040)={0x184, 0x0, 'client0\x00', 0x1, "425f7a926d270215", "a745b9176b968a6b44331e054f03f11997cfb0179e0ef4e7334187858f133f94", 0x4, 0x5}) 04:53:32 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000081040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e]}}]}, 0x2c}}, 0x0) 04:53:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0xff, {{0x2, 0x4e20, @loopback}}}, 0x88) socket(0x4, 0x807, 0x7) accept4$alg(r0, 0x0, 0x0, 0x26f02846e3a0dfa4) [ 1032.612481][T23033] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000", 0x32, 0x10000}], 0x0, 0x0) 04:53:32 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000002c260000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0]}}]}, 0x2c}}, 0x0) [ 1032.805089][T23028] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1032.840485][T23028] BTRFS error (device loop1): superblock checksum mismatch 04:53:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) lookup_dcookie(0x2, &(0x7f00000009c0)=""/4096, 0x1000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40cb02f1a4739986, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x7, 0x281c2) [ 1032.871610][T23028] BTRFS error (device loop1): open_ctree failed [ 1033.023268][T23164] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:33 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xd000000]}, 0x63) 04:53:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}]}, 0x2c}}, 0x0) 04:53:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000", 0x32, 0x10000}], 0x0, 0x0) 04:53:33 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000003c0000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:33 executing program 1: bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xfffffffffffffffc, 0x0) 04:53:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}]}, 0x2c}}, 0x0) 04:53:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f00000001c0)=0xb) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0xa45) ioctl$TCSETSF(r2, 0x5437, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1033.628682][T23285] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 04:53:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}]}, 0x2c}}, 0x0) [ 1033.747444][T23285] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1033.749900][T23286] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 849460401617 transid 756082810144684242 /dev/loop1 04:53:33 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000000830000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="65fd47f83028378a314329adb2cadab10dc6222ad452e4d2d118047f168a075997d03f380d1b3e00d2fb6a8dcb0a9835a8a4487f6d4c45e7", 0x38, 0x7}], 0x0, 0x0) [ 1033.911038][T23286] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1033.940593][T23286] BTRFS error (device loop1): superblock checksum mismatch [ 1034.003225][T23286] BTRFS error (device loop1): open_ctree failed [ 1034.016192][T23419] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1034.183427][T23419] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:34 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xe000000]}, 0x63) 04:53:34 executing program 0: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000, 0x0, &(0x7f0000000240), 0x1, 0x0) 04:53:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 04:53:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}]}, 0x2c}}, 0x0) 04:53:34 executing program 1: bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:34 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000000880000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) [ 1034.683100][T23443] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}]}, 0x2c}}, 0x0) 04:53:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = socket(0x1, 0x1, 0x3c11) bind$isdn_base(r0, &(0x7f0000000040)={0x22, 0x700000000000, 0x5a17, 0x7, 0x516e}, 0x6) [ 1034.794637][T23443] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}]}, 0x2c}}, 0x0) [ 1034.907186][T23447] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1034.921164][T23447] BTRFS error (device loop1): superblock checksum mismatch 04:53:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, 0x0) 04:53:34 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) io_setup(0xfffffffffffffff8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x0, &(0x7f0000000140)) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040), 0x4) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1034.960879][T23447] BTRFS error (device loop1): open_ctree failed 04:53:35 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xf000000]}, 0x63) 04:53:35 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000000f50000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}]}, 0x2c}}, 0x0) 04:53:35 executing program 0: chroot(&(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000040)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='efivarfs\x00', 0x8, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:35 executing program 1: bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, 0x0) 04:53:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}]}, 0x2c}}, 0x0) 04:53:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x1}) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x2b40, 0xc000) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000140)={0x88, @local, 0x4e23, 0x2, 'rr\x00', 0x22, 0x9a7e, 0x57}, 0x2c) [ 1035.701248][T23727] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, 0x0) 04:53:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}]}, 0x2c}}, 0x0) [ 1035.814001][T23727] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:35 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000f2ffff7f004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1035.903078][T23695] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1035.958429][T23695] BTRFS error (device loop1): superblock checksum mismatch 04:53:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}]}, 0x2c}}, 0x0) [ 1036.022508][T23695] BTRFS error (device loop1): open_ctree failed [ 1036.085703][T23928] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1036.196101][T23928] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:36 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x10000000]}, 0x63) 04:53:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:53:36 executing program 0: sysfs$2(0x2, 0xc8e, &(0x7f0000000000)=""/3) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}]}, 0x2c}}, 0x0) 04:53:36 executing program 1: bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:36 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000f8ffff7f004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}]}, 0x2c}}, 0x0) [ 1036.611726][T23954] BTRFS error (device loop1): unsupported checksum algorithm 22813 04:53:36 executing program 0: r0 = creat(&(0x7f0000000000)='./file0/file0\x00', 0x8) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') write$P9_RREADLINK(r0, &(0x7f0000000240)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x0, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x804) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f00000004c0)={0x8e, 0x7d, 0x1, {{0x0, 0x73, 0xfffffffffffffff9, 0x1, {0x42, 0x1, 0x7}, 0xa080000, 0x80, 0x4, 0x2, 0x5, 'TIPC\x00', 0xe, 'loGPLmime_type', 0x5, 'TIPC\x00', 0x28, 'posix_acl_accessvboxnet0security(em1GPL\\'}, 0x6, 'btrfs\x00', r2, r3, r4}}, 0x8e) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x410cc0, 0x0) [ 1036.684656][T23962] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1036.691070][T23954] BTRFS error (device loop1): superblock checksum mismatch [ 1036.741839][T23954] BTRFS error (device loop1): open_ctree failed [ 1036.768571][T23962] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}]}, 0x2c}}, 0x0) 04:53:36 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000f9ffff7f004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, 0x0) [ 1036.824331][T23958] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1036.838323][T23958] BTRFS error (device loop1): superblock checksum mismatch 04:53:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="f0d29cf55133a71817ee92b12a65f7921fd4d465366ea25b38c9b0ee9f587e6b431bb181a957df4cbc053222cb9b61349bbc1f150b6a96c4f9fc326e574329616a275d08d4130408b155d375d237cbc1c2fd35592550d4b51fe04276b4d27fac1b08d75864c3f29a65430e8c8e95d6338e1a21ebceb85d985ff9e643d8d1b315b5f73467bcc8e81fa9e0d5f39869125917f3b9e664803e0fb092c0e7d66ecac750ee2c1a7dabe6a8cea973c650be87ce700556139ef49808", 0xb8, 0x4}], 0x4, 0x0) [ 1036.975800][T23958] BTRFS error (device loop1): open_ctree failed [ 1037.055035][T24086] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1037.207984][T24086] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:37 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x11000000]}, 0x63) 04:53:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}]}, 0x2c}}, 0x0) 04:53:37 executing program 0: r0 = getpid() r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x40, 0x101040) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ptrace$pokeuser(0x6, r0, 0x7ff, 0x7ff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:37 executing program 1: bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, 0x0) 04:53:37 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000feffff7f004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}]}, 0x2c}}, 0x0) [ 1037.700567][T24111] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, 0x0) 04:53:37 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x16e00) socket$isdn_base(0x22, 0x3, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)=0x3bc0, 0x4) lgetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='trusted.overlay.opaque\x00', &(0x7f00000002c0)=""/25, 0x19) syz_mount_image$btrfs(&(0x7f00000004c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000000)="c38085833db44836ea37be6de21c44c7676db59ea2e78699e6fab3982bf7c12d756f0a00956b6582055e8270869373bf32a264c5be5550aed9d756d7c67fd6e03886c9dc874a3c723e9867359b7cb573dcd486e00d8a351740557dc4", 0x5c, 0x1f}, {&(0x7f00000000c0)="879c44a8f401cd9e714c973db8ada8f63a775b81a65fe2e3d403d998ff99f6c418a83cf4b57479", 0x27, 0x4}, {&(0x7f0000000500)="1d59db30cf191dac06d330badf48dbff1e2d262336", 0x15, 0x7}], 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000300)=r0) accept$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) [ 1037.798523][T24117] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1037.804916][T24111] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1037.821125][T24117] BTRFS error (device loop1): superblock checksum mismatch 04:53:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}]}, 0x2c}}, 0x0) [ 1037.858788][T24117] BTRFS error (device loop1): open_ctree failed 04:53:37 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000001fffffff004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}]}, 0x2c}}, 0x0) [ 1038.121684][T24291] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1038.209408][T24291] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:38 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x12000000]}, 0x63) 04:53:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 04:53:38 executing program 1: bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) 04:53:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}}]}, 0x2c}}, 0x0) 04:53:38 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001020000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}}]}, 0x2c}}, 0x0) [ 1038.667552][T24372] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x1000000000000, 0x0) 04:53:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 04:53:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105000000000000]}}]}, 0x2c}}, 0x0) 04:53:38 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000000)={0x8000, 0x7fffffff, 0x40, 0x7}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1038.831098][T24372] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1038.862478][T24375] BTRFS error (device loop1): unsupported checksum algorithm 22813 04:53:38 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001030000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1038.890465][T24375] BTRFS error (device loop1): superblock checksum mismatch [ 1038.937170][T24375] BTRFS error (device loop1): open_ctree failed [ 1039.161697][T24608] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1039.197183][T24608] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:39 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x13000000]}, 0x63) 04:53:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80040, 0x0) getsockname$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000040)=0xffffffffffffffe4) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000340)={0xc00, {{0x2, 0x4e24, @broadcast}}}, 0x88) r1 = request_key(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='/dev/audio\x00', 0xffffffffffffffff) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000240)="3cbbeb2e933dc6f89ea9353f4460f43a9d4e64379b59a71c2b75633460efe6990da251a4988cc263aeb215514d6dd65841a92af76fa925d652029e9efdc449262e0bb802fc8e5f55", 0x48, r1) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) 04:53:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}]}, 0x2c}}, 0x0) 04:53:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 04:53:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:53:39 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001040000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}]}, 0x2c}}, 0x0) 04:53:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 04:53:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x24180) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'bpq0\x00', 0x3}, 0x18) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x7, 0x0, 0x100, 0x1000, 0x0, 0x1f, 0x2000, 0x0, 0x5, 0x3, 0x4, 0x1, 0x0, 0x20, 0x67, 0x80000000, 0x2, 0x1, 0x1, 0x0, 0x3ff, 0x6, 0x278, 0xd8, 0x0, 0x5, 0x80000001, 0x0, 0x47, 0x77c86874, 0xfaa, 0x1000, 0xffffffffffffffff, 0x3ff, 0xff, 0x3ff, 0x0, 0x3, 0x0, @perf_config_ext={0x401, 0x8001}, 0x0, 0x4, 0x7, 0x7, 0x2, 0x1000, 0x3}, r1, 0x3, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000001c0)={0xb2, 0x1, {0xffffffffffffffff, 0x2, 0x1ff, 0x0, 0x6d29f0e3}}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r0}) socket$caif_stream(0x25, 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x1) getsockopt$inet6_tcp_int(r0, 0x6, 0x26, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:53:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1039.759296][T24634] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558000000000000]}}]}, 0x2c}}, 0x0) [ 1039.871531][T24634] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:39 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001050000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1040.206375][T24867] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1040.282192][T24867] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:40 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x14000000]}, 0x63) 04:53:40 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}}]}, 0x2c}}, 0x0) 04:53:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:53:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 04:53:40 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001060000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}}]}, 0x2c}}, 0x0) 04:53:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000359fd5)=ANY=[@ANYBLOB="e187a48d30b300001400000008119078ac14ffbbe00000010000000000089078"], 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000040)={0x3, 0x8000}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000300)=0x191fc) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000200)=""/218) r2 = semget(0x3, 0x4, 0x0) semctl$GETVAL(r2, 0x3, 0xc, &(0x7f0000000440)=""/77) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64\x00', &(0x7f00000001c0)='btrfs\x00', 0x6, 0x1) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000004c0), 0x4) renameat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f00000003c0)='./file0\x00') getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f00000000c0), &(0x7f0000000340)=0x4) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) bind$rose(r1, &(0x7f0000000500)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) 04:53:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 1040.834867][T24928] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000]}}]}, 0x2c}}, 0x0) 04:53:40 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001070000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:40 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1041.169889][T25118] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1041.331546][T25118] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:41 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x15000000]}, 0x63) 04:53:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}}]}, 0x2c}}, 0x0) 04:53:41 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:53:41 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x121000, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x20000000000027, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0x12}, @empty, @multicast2}, 0x248) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:41 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:53:41 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001080000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1041.801569][T25143] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}, 0x2c}}, 0x0) 04:53:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xffffffff, 0x8000) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000040)=0x7) [ 1041.961870][T25148] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 17487635432702809553 transid 756082810144684242 /dev/loop5 [ 1041.964761][T25143] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:41 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:53:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}]}, 0x2c}}, 0x0) 04:53:41 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001090000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1042.165615][T25148] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1042.193812][T25148] BTRFS error (device loop5): superblock checksum mismatch 04:53:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x1000080, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40001, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0x17, 0x4) sendto$rose(r0, &(0x7f0000000140)="5588826caabcedbb904e59dbb6fa7f625f2f12be633882438792473244f7d1f1a6afca602cf354d732ac6898206aeda1039d9dff990f81db80203245dc2ea60a315766b44c9b0b7bc3a532271005b017893f8141d838d3db28b1ecd41dd0e9e27ad80b990bc72d8dbe8f192bfb048ee9e0990ae000b6840bdefd8229fce0eec0464bbccdca71f342d84025d8561c4752371c4db409398c810f0886c46cfc156b54364869a49d51bab03d473c7fd6cebddbeff419240bd87d6870947738e9bf18ee63d75ebee75260bfea2d5feb95171d31bd781f79f066c00c6ee9c59beeda2532", 0xe1, 0x44040, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, 0x4, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x40) [ 1042.210875][T25148] BTRFS error (device loop5): open_ctree failed [ 1042.303412][T25377] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1042.435618][T25377] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:42 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x18000000]}, 0x63) 04:53:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:53:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}]}, 0x2c}}, 0x0) 04:53:42 executing program 5: bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:42 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6, [@default, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null]}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x280000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') 04:53:42 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000010a0000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}]}, 0x2c}}, 0x0) 04:53:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1042.863256][T25504] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:42 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0x20) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1042.952906][T25504] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:42 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001230000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}]}, 0x2c}}, 0x0) 04:53:42 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x121000, 0x40) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x9, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000180)={'teql0\x00', 0x100}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x40412005, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {0x0}, {}, {}, {}]}) getpeername(r0, &(0x7f0000000240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0xfffffffffffffffe) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000140)={r4, 0x10}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000000)=r1) [ 1043.136485][T25508] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1043.181105][T25508] BTRFS error (device loop5): superblock checksum mismatch [ 1043.243927][T25746] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1043.267161][T25508] BTRFS error (device loop5): open_ctree failed [ 1043.420803][T25746] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:43 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x40000000]}, 0x63) 04:53:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}]}, 0x2c}}, 0x0) 04:53:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:53:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000140)=""/239, 0xef) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x6) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000240)=""/193, &(0x7f0000000340)=0xc1) 04:53:43 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:53:43 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000012d0000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}]}, 0x2c}}, 0x0) [ 1043.776076][T25872] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:53:43 executing program 0: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) select(0x40, &(0x7f0000000140)={0x9}, 0x0, &(0x7f00000001c0)={0x1, 0x3f, 0x200, 0x585, 0x17, 0x1, 0xaedc, 0x2293}, &(0x7f0000000200)={0x0, 0x2710}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}]}, 0x2c}}, 0x0) [ 1043.957551][T25872] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1043.981611][T25869] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1043.989768][T25869] BTRFS error (device loop5): superblock checksum mismatch 04:53:43 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001480000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}]}, 0x2c}}, 0x0) [ 1044.124874][T25869] BTRFS error (device loop5): open_ctree failed [ 1044.267253][T26110] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1044.339263][T26110] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:44 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1000000000000]}, 0x63) 04:53:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:53:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x101002, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x80}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r1, 0x100000001, 0x6}, 0x8) 04:53:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}]}, 0x2c}}, 0x0) 04:53:44 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:53:44 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000014c0000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}]}, 0x2c}}, 0x0) 04:53:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2000, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x8, 0x1, 0x2}) [ 1044.829088][T26157] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1044.918974][T26157] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}]}, 0x2c}}, 0x0) [ 1044.978850][T26131] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1044.988139][T26131] BTRFS error (device loop5): superblock checksum mismatch 04:53:44 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001600000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1045.042589][T26131] BTRFS error (device loop5): open_ctree failed 04:53:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x2000, 0x0) [ 1045.292911][T26370] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1045.373512][T26370] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:45 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x100000000000000]}, 0x63) 04:53:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}]}, 0x2c}}, 0x0) 04:53:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000001c0)="8da4c71ec5aff16adad89203f2363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100966c2a6f00005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a1b035fd98372e7c2a6970f550441457f8ad3a46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d100000000000000000000000000", 0xd5, 0x10000}], 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f00000000c0), 0xfffffffffffffe49) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000002c0)) r1 = dup3(r0, r0, 0x80000) dup3(r1, r1, 0x80000) accept$ax25(r0, &(0x7f0000000140)={{0x3, @bcast}, [@default, @null, @null, @default, @netrom, @null, @default, @default]}, &(0x7f0000000040)=0x48) ioctl$TCSBRKP(r0, 0x5425, 0xff) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:53:45 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:45 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001680000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:53:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}]}, 0x2c}}, 0x0) [ 1045.728734][T26385] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:45 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000016c0000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x398, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x820, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000001c0)) 04:53:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) [ 1045.939930][T26417] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1045.985918][T26417] BTRFS error (device loop5): superblock checksum mismatch [ 1046.015523][T26417] BTRFS error (device loop5): open_ctree failed 04:53:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}}]}, 0x2c}}, 0x0) [ 1046.029616][T26570] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="3b54d0a48b3659eeacd188ff13f0d4ec497f32a9c6849676e44d601bd6ea340c32d98600138c830a58e09ca1e1977922c765181572c9156484ba5a9d1efbd2994ac5bff51e15dd24b876c2fe6a6a41f70fd5ae3805a5a06e6259f11d17a7aa5a1bfaaaf3f1b96af82738fccb6fa71ee5d8037039709f277634e1a0bd4739267b1e30e74eb87df14bedf473c105e9f142f8cb88c358d47f7a1e5049e331d70c409af9130453c6eefadd74d6bc00ec13155f03ad7f9ec595cf013d606920aa084b8335c5ddc45f250bb34733497bd18fd685aae46f169f31f11ced1c7078f5166cfc5f03", 0x478, 0x5}], 0x0, 0x0) 04:53:46 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x200000000000000]}, 0x63) 04:53:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}]}, 0x2c}}, 0x0) 04:53:46 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001740000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000040)) 04:53:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:53:46 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}]}, 0x2c}}, 0x0) [ 1046.789543][T26647] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:53:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}}]}, 0x2c}}, 0x0) [ 1046.911830][T26647] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x420, &(0x7f0000000140)='+}\x00') [ 1046.964277][T26645] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1046.978543][T26645] BTRFS error (device loop5): superblock checksum mismatch 04:53:46 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000017a0000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1047.023845][T26645] BTRFS error (device loop5): open_ctree failed 04:53:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}}]}, 0x2c}}, 0x0) [ 1047.224717][T26777] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1047.342524][T26777] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:47 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x300000000000000]}, 0x63) 04:53:47 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000180)=0x4, 0x4) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0xffff, 0x7}, {0xffffffffffff0000, 0x1}]}, 0x14, 0x1) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 04:53:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:53:47 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:47 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000300004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}]}, 0x2c}}, 0x0) 04:53:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}}]}, 0x2c}}, 0x0) [ 1047.704777][T26800] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:47 executing program 0: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x30d000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x701000, 0x0) memfd_create(&(0x7f0000000140)='![eth1security$wlan0vmnet0wlan1]\x00', 0x4) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1047.815036][T26800] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}]}, 0x2c}}, 0x0) 04:53:47 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001100400004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 1047.956619][T26806] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1047.991151][T26806] BTRFS error (device loop5): superblock checksum mismatch [ 1048.034506][T26806] BTRFS error (device loop5): open_ctree failed [ 1048.152663][T27014] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:47 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000440)={"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"}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1048.257103][T27014] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:48 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7d", 0xd8, 0x10000}], 0x0, 0x0) 04:53:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000001500)='./file0\x00', 0x80080, 0x180) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xfffffffffffffff7, @local, 0x3}, @in6={0xa, 0x4e23, 0x9, @mcast2, 0x6}, @in={0x2, 0x4e22, @rand_addr=0xfffffffffffffffe}], 0x58) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x6, 0x7ff, 0x81, 0x2, 0x1e}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={r1, 0xe2, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000001540)=[@in6={0xa, 0x4e20, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xd3}, @in6={0xa, 0x4e20, 0x9, @empty, 0x3}, @in6={0xa, 0x4e22, 0x2, @mcast1, 0x936}], 0x54) 04:53:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}]}, 0x2c}}, 0x0) 04:53:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:48 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400000000000000]}, 0x63) 04:53:48 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000500004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x521]}}]}, 0x2c}}, 0x0) [ 1048.753836][T27166] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:48 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x30001) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000040)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1048.859966][T27166] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}]}, 0x2c}}, 0x0) 04:53:48 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000600004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:48 executing program 0: mknod(&(0x7f0000000200)='./file0\x00', 0x20, 0xfc) mknod(&(0x7f00000000c0)='./file0\x00', 0x8006, 0x2f5afda6) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x366, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x10001, 0x7, 0xfffffffffffffff8, 0x6}) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000000)={0x2, 0x1, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) [ 1049.072646][T27161] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1049.091780][T27161] BTRFS error (device loop5): superblock checksum mismatch [ 1049.151903][T27161] BTRFS error (device loop5): open_ctree failed [ 1049.253138][T27406] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}]}, 0x2c}}, 0x0) [ 1049.355047][T27406] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:49 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x500000000000000]}, 0x63) 04:53:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 04:53:49 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="d6eefbc1a5381e060a9fdc0852601f59b52635f0d4ce6d4ceea73da54917325a9e6c0eb1560abcb1b75e285d1e195ba1194b0b51af3a8b0c99d4caccc06ac52a669f012ef324eec0b48a62785968fa48ea21323f59640dca025cef8dcc9d98f0f03a659ef2f555b028a01a1b6804ff5cf6cbc0276f0ca0385dfde80540d3791c4683ca8909f34954", 0x88, 0x7fff}], 0x800, &(0x7f0000000280)={[{@metadata_ratio={'metadata_ratio', 0x3d, 0x8}}, {@subvol={'subvol', 0x3d, 'em1wlan1'}}, {@fragment_metadata='fragment=metadata'}, {@compress='compress'}], [{@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@obj_role={'obj_role'}}, {@audit='audit'}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@permit_directio='permit_directio'}]}) recvfrom(r0, &(0x7f0000000000)=""/122, 0x7a, 0x40000002, 0x0, 0x0) 04:53:49 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000700004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}]}, 0x2c}}, 0x0) 04:53:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}}]}, 0x2c}}, 0x0) [ 1049.705661][T27535] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 04:53:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x20880) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000240)={@rand_addr=0xfffffffffffffff8, @dev={0xac, 0x14, 0x14, 0x1d}, r1}, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x1d, 0x4) [ 1049.782516][T27535] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:49 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000900004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1049.903371][T27530] BTRFS error (device loop5): unsupported checksum algorithm 22813 04:53:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}]}, 0x2c}}, 0x0) [ 1049.946205][T27530] BTRFS error (device loop5): superblock checksum mismatch 04:53:49 executing program 0: ustat(0x5, &(0x7f0000000000)) init_module(&(0x7f0000000040)='ppp0\x9bem0*$--lo\x00', 0xf, &(0x7f0000000080)='cgroup\x00') [ 1050.022984][T27530] BTRFS error (device loop5): open_ctree failed [ 1050.056664][T27757] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1050.211773][T27757] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:50 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x600000000000000]}, 0x63) 04:53:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 04:53:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}]}, 0x2c}}, 0x0) 04:53:50 executing program 0: getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)=0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x80840, &(0x7f00000001c0)=ANY=[@ANYBLOB='xino=off,xino=off,metacopy=on,metacopy=on,index=off,subj_role=%+eth0,euid>', @ANYRESDEC=r0, @ANYBLOB=',rootcontext=staff_u,fscontext=unconfyned_u,appraise_type=imasig,rootcontext=root,subj_type=btrfs\x00,\x00']) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000300)=0x3, 0x4) 04:53:50 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:50 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000a00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}}]}, 0x2c}}, 0x0) [ 1050.715403][T27795] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02078c30a4d471efa773c9ffbac947c67b693295"], 0x14, 0x1) 04:53:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}]}, 0x2c}}, 0x0) 04:53:50 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001041000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 1050.914664][T27797] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1050.961178][T27797] BTRFS error (device loop5): superblock checksum mismatch 04:53:50 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10080, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x349, &(0x7f0000000400), 0x0, 0x0) [ 1051.044554][T27797] BTRFS error (device loop5): open_ctree failed [ 1051.063380][T27928] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:51 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x700000000000000]}, 0x63) 04:53:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}}]}, 0x2c}}, 0x0) 04:53:51 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001201000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 04:53:51 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x5, 0x20200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r1, 0x7, 0x0, 0x0, 0x0, @in={0x2, 0x9, @remote}, @ib={0x1b, 0x4f03, 0x9, {"24ac45798fc8ef48f8ef73264774ab82"}, 0xaa8, 0x8}}}, 0x118) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000140)) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xa00000, 0x80000000, 0xffffffffffff20ec, [], &(0x7f0000000180)={0xbb0977, 0x9c3, [], @value=0x1}}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000080)={{0x8}, 'port1\x00', 0x14, 0x100402, 0x80000001, 0x1, 0x0, 0x200, 0x1c7, 0x0, 0x0, 0x8}) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000040)={{0x4, 0x4b8, 0x7fffffff, 0x3, 0x7, 0x5}, 0x4}) close(r2) 04:53:51 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300]}}]}, 0x2c}}, 0x0) 04:53:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 1051.753513][T28053] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1, 0x13}}, 0x10) prctl$PR_GET_SECCOMP(0x15) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000180)) 04:53:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105]}}]}, 0x2c}}, 0x0) 04:53:51 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001002000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1051.917799][T28053] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1051.928444][T28056] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1051.953649][T28056] BTRFS error (device loop5): superblock checksum mismatch 04:53:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}]}, 0x2c}}, 0x0) [ 1051.983801][T28056] BTRFS error (device loop5): open_ctree failed [ 1052.182665][T28301] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1052.263253][T28301] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:52 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x800000000000000]}, 0x63) 04:53:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 04:53:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:53:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5865]}}]}, 0x2c}}, 0x0) 04:53:52 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:52 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001102000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1052.698275][T28324] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}]}, 0x2c}}, 0x0) 04:53:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 04:53:52 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) accept4$inet6(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x1c, 0x80000) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 1052.854634][T28324] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1052.903649][T28322] BTRFS error (device loop5): unsupported checksum algorithm 22813 04:53:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558]}}]}, 0x2c}}, 0x0) 04:53:52 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001002300004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1052.947797][T28322] BTRFS error (device loop5): superblock checksum mismatch [ 1053.034339][T28322] BTRFS error (device loop5): open_ctree failed [ 1053.224442][T28467] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 04:53:53 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x900000000000000]}, 0x63) 04:53:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) socketpair(0xb, 0xf, 0x2b3b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000140)={'batadv0\x00', 0xdbe5, 0x1000}) 04:53:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}}]}, 0x2c}}, 0x0) 04:53:53 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001002d00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:53 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c5", 0xce, 0x10000}], 0x0, 0x0) 04:53:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}}]}, 0x2c}}, 0x0) [ 1053.730824][T28489] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) [ 1053.827725][T28482] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1053.846936][T28482] BTRFS error (device loop5): superblock checksum mismatch 04:53:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7d3, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x12, 0x181) socket$nl_generic(0x10, 0x3, 0x10) 04:53:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}]}, 0x2c}}, 0x0) [ 1053.887627][T28489] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:53 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001003f00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1053.951585][T28482] BTRFS error (device loop5): open_ctree failed 04:53:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000040)={&(0x7f0000000200)}, 0x2, &(0x7f00000003c0)={&(0x7f0000000340)}}, 0xffffffffffffff79) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x208000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x7, @rand_addr="da75b04f66cfa18620d938008d65e29e"}}, 0x1, 0x100, 0x8, 0x3, 0x20}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000240)={r1, 0xe1eb}, 0x8) 04:53:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 1054.192557][T28861] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1054.311705][T28861] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:54 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xa00000000000000]}, 0x63) 04:53:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}]}, 0x2c}}, 0x0) 04:53:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 04:53:54 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001004000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:54 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 04:53:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) mq_open(&(0x7f0000000000)='\x85%\x00', 0x840, 0x2, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x3, 0x5, 0x3fd, 0x0, 0x49c59318}) [ 1054.669965][T28879] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}}]}, 0x2c}}, 0x0) 04:53:54 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000240)={0x9, 0x7000}) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000280)=""/134, &(0x7f0000000340)=0x86) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$bt_sco(r0, &(0x7f00000003c0)={0x1f, {0x0, 0x4, 0x4, 0xfff, 0x2, 0x101}}, 0x8) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000640)=0x20020082) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xa000, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000040)={0x17, 0xe8, &(0x7f0000000140)="fac3af20b3c323e080542950b91d4225b3b6287570281d68155a51309f7de3b1346e9bec57c606a2958d17de96cb85bba678e57ebc614f2c7187a9ebdae1e2455362b506511d19a976fcfa22778565d3b7f3354209584033e7e04e4fd44ae214c12b865d83198734282e53a291d98cf3a5ea5db5a650efe120f294358d611dfbd6a76b73ae7d9a14278dca088aabc2954c00aacfc953831caaa9450361666526403f6ffcbf0d9850f58aa06729ad777f75711ebb4082d925562498ba2ffe8f2b0851d01003c7bf5ab9f6994fc869dfce5e65c6ae09da12e9d06977801f5544772792c85f04b6deee"}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000700), &(0x7f0000000740)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f00000005c0)={{0x6, @addr=0xef6}, 0xffffffffffffffdb, 0x1c, 0x401}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000500)={0x14, 0x88, 0xfa00, {r3, 0x14fa12801ca4bd91, 0x0, @in6={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000680)='system\\%{[\x00', 0xffffffffffffffff}, 0x30) tkill(r4, 0xd) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000a40)=0x14) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f00000000c0)={0x81, 0x7}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x1a}, 0x9}}, 0x5, 0x1}, &(0x7f0000000840)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000880)={r6, 0x8bb22c, 0x0, 0xdc, 0x81}, &(0x7f00000009c0)=0x18) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000600)=0x0) fcntl$setown(r2, 0x8, r7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a00)={r4, r2, 0x0, 0x20, &(0x7f0000000380)='eth1posix_acl_accessnodev-wlan1\x00', r5}, 0x30) 04:53:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}]}, 0x2c}}, 0x0) [ 1054.821935][T28879] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 04:53:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaf6, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da43600000000004d010000000000000000000000beb15ffaecf6f2a2299748aeb81e1b00920efd9a000001000000000801000000000000005f42485266535f4dd2f873574f257e0a01e200000000071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263d4a48c59ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e17a00000000000000eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xfffffffffffffe2d, 0xfffd}], 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) creat(&(0x7f0000000140)='./file0\x00', 0x23) 04:53:54 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001004800004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1054.901279][T28885] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1054.921443][T28885] BTRFS error (device loop5): superblock checksum mismatch [ 1054.963068][T28885] BTRFS error (device loop5): open_ctree failed [ 1055.132401][T29017] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1055.210747][T29017] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 04:53:55 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xb00000000000000]}, 0x63) 04:53:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}]}, 0x2c}}, 0x0) 04:53:55 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001004c00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:55 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 04:53:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1055.669531][T29137] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() getgroups(0x2, &(0x7f00000004c0)=[0xffffffffffffffff, 0x0]) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000500)={{}, {0x1, 0x2}, [{0x2, 0x1, r0}, {0x2, 0x4, r1}, {0x2, 0x0, r2}, {0x2, 0x3, r3}, {0x2, 0x2, r4}, {0x2, 0x2, r5}, {0x2, 0x6, r6}], {0x4, 0x7}, [{0x8, 0x1, r7}], {0x10, 0x4}, {0x20, 0x7}}, 0x64, 0x1) 04:53:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}]}, 0x2c}}, 0x0) [ 1055.723273][T29140] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1055.736118][T29140] BTRFS error (device loop5): superblock checksum mismatch [ 1055.804295][T29140] BTRFS error (device loop5): open_ctree failed 04:53:55 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001006000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 04:53:55 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f00000000c0)={r0, 0x6cf, 0x10001, 0x201, 0xe0, 0x4, 0x77}) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x3fa, 0x189000) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000140)=""/71) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000001c0)={'bpq0\x00', {0x2, 0x4e21, @broadcast}}) getsockopt$llc_int(r1, 0x10c, 0x2, &(0x7f0000000100), &(0x7f0000000280)=0x4) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x4}], 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 04:53:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}]}, 0x2c}}, 0x0) 04:53:55 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) [ 1056.149337][T29331] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1056.231044][T29380] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1056.241774][T29380] BTRFS error (device loop5): superblock checksum mismatch [ 1056.274568][T29331] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1056.275703][T29380] BTRFS error (device loop5): open_ctree failed 04:53:56 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xc00000000000000]}, 0x63) 04:53:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}]}, 0x2c}}, 0x0) 04:53:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 04:53:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) vmsplice(r0, &(0x7f00000006c0)=[{&(0x7f0000000280)="cdc20a3d4ed2b67c6af51fc235e5ca6f26ff52ceae69803150fd38e002503297dd67da814e5a2a175adc6340b36e4932bfc8877420fd662a7292bb49160494a186be7a70f774fe1eefd5dedb7dfe2b46f148d4a761034ed435edd622771b37e204caa79b8eb465f2a745647035eb1a30c70590cdec64e6d97ea5bfd5cbe91e65f58709e6a60b00f57dd3f75757649a9a046f6aa21d212e6f2b45fb9a5e7e418719c61a57f1476e1b340c0be09de7746b69ddf6c2a32e1cb6f836b57aa1f9ef292f845b2f5858d7cf4f7dfb65d0163f38", 0xd0}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f0000000440)="039636d8c9dfb0e3218f926598442a7a3a6d5a4915ded21f695b717a03ddc73930ef11a8837a8c4dc0cf033ed34706bff587329224d273da642b1c702dbb940fd793838c38bf0408fbd26fda8bee9cd6ad3dc02d3eae11024e572f4f766b7a97e6e0f4ad01461ffb33721ca32cbfad5ff3ab21bee956f2dd59c8f8aa183529e07352d3d3d25b6df529814cae05851a3b0f4cb0c8acef11f93d496cfa89946291398c202f89b190aa91cc6ea3", 0xac}, {&(0x7f0000000040)="bf4a0d89924cfa5a236c89343c2829adec629a674dad51442cd6dbb6d561e36f01c58f870b96dc772ff70ba95d31d035d422ed4c12966de9", 0x38}, {&(0x7f0000000500)="6dcb6ce7eb4fcea7df70dce8e10bbf2988a7925fb4c5c80a6a0a9ce5ba465f3edf4c50aa4aaf0b3ae6b2c27dde4f33f2a67f63789d8260517ceedaaca3531bdf68baa8040178911346ce6a3534ccafe04622228423db00c6807bd3a6e604f7a2e1487a4d3fd41a2fef0a516cddeec59516f3361a9b1374e81d7a0ac3bcdb3a0ee3da745cdf4bdce91b0080f4b37d7054928638203d", 0x95}, {&(0x7f00000005c0)="b85c277ce3fdc6e1f3d1b7b074149c86d58be48e4122bb443d3e2c2e57f90903666faa36c332085345275e9f313a36f3fda24c88b5604e66f0badee618d5bb0d7ac661dea38960fc6f75291b33beddc69fa44a4de03f04bc1b116fd42310a408259f53fc6ab820b446bcabe17e6472dc9bbdabc49201709a1316cbc3276e0554fda77bce3536ab8bd8511e4d5640a7e3f39efc88cda5095f35627ff59da2bc9334516fcbf8022b4c9a5b9b12c00375c57cd116f46bf4aa6d0842d8eef1cc87e666b6fca476b50b8cfb4bc66cc7d17b8289b4fdee4f42ed28a0865d74fa", 0xdd}, {&(0x7f0000000380)="07b9ea0250fe7d57fbaf376195d680ce313259dde32637ac88e7b83c960f3bee919e7b0c41744d749366cd3edf3354c570dd2f9b564728e252208d4cbf4ba820120d4ae9963cf42a1fc92dc8050437ca", 0x50}, {&(0x7f00000000c0)="bb39128937a2bc92d836181a2ba0ffe86b84e8d36b0a1c7a8b460c81dc", 0x1d}, {&(0x7f0000000140)="53bcfd5259a787aa52fca610b09a72ffb8420ac1516b20968910325c", 0x1c}], 0x9, 0x2) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) connect$unix(r1, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 04:53:56 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001006800004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:56 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 04:53:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}]}, 0x2c}}, 0x0) [ 1056.728800][T29408] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 1056.829072][T29401] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1056.844652][T29401] BTRFS error (device loop5): superblock checksum mismatch 04:53:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}]}, 0x2c}}, 0x0) [ 1056.877415][T29408] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) io_setup(0x401, &(0x7f00000000c0)=0x0) io_getevents(r2, 0x1, 0x7, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000340)={0x0, 0x1c9c380}) 04:53:56 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001006c00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1056.936375][T29401] BTRFS error (device loop5): open_ctree failed 04:53:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 1057.124300][T29607] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1057.229753][T29607] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:57 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xd00000000000000]}, 0x63) 04:53:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}]}, 0x2c}}, 0x0) 04:53:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 04:53:57 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 04:53:57 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001680)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) sendto(r1, &(0x7f00000016c0)="9673216d12171971241301352b21f39ce9f53d65f1423db857d9ea3a39f3dfff5082de462a5e371f67982de53b7f0041dafd4fff90974fed831935c2c47b095297fffb47b40d6f8348a8abef3558ae249dbd89bd991c7d09da3e7ff6554829455f529e2e55f01cae89178079b27beed180b9619cd0a46b69ff9c6b57e3f2c8979f1ba4549155adaa3559bf8c7f84d7d101cd389d2e053851334214710fd212d4135bc0b7e551dc02bbd873d08489ae685d3f0eb72ff4e6ce4adf99b1a273952fca7cd08b7f7271e7d859bba4ced4004af1db6b0ee23f1fdd853d", 0xda, 0x4000010, 0x0, 0x0) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/245, 0xf5}], 0x1, &(0x7f0000001580)=[{&(0x7f0000000240)=""/222, 0xde}, {&(0x7f0000000340)=""/254, 0xfe}, {&(0x7f0000000440)=""/102, 0x66}, {&(0x7f00000004c0)=""/185, 0xb9}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x5e, 0x0) lstat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0, 0x0}, &(0x7f0000001900)=0xc) fchownat(r1, &(0x7f00000017c0)='./file1\x00', r2, r3, 0x1100) setxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000001600)='trusted.overlay.nlink\x00', &(0x7f0000001640)={'L+', 0x6}, 0x28, 0x1) 04:53:57 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001007400004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}]}, 0x2c}}, 0x0) 04:53:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x1, &(0x7f0000000400), 0x0, 0x0) 04:53:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 1057.719896][T29684] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}}]}, 0x2c}}, 0x0) [ 1057.837515][T29684] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1057.866871][T29661] BTRFS error (device loop5): unsupported checksum algorithm 22813 04:53:57 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x6, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000340)={{0xf47, 0xcbe1, 0x1, 0x100000001, 0x10000, 0x200}, 0xfffffffffffffffa}) getpid() syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x40010000}], 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x1, 0x4) utime(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0xffffffff80000001, 0x8}) [ 1057.887670][T29661] BTRFS error (device loop5): superblock checksum mismatch 04:53:57 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001007a00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1057.937690][T29661] BTRFS error (device loop5): open_ctree failed [ 1058.182908][T29901] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1058.287870][T29901] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:58 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xe00000000000000]}, 0x63) 04:53:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}]}, 0x2c}}, 0x0) 04:53:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 04:53:58 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001c0ed00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:53:58 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 04:53:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1800000000000000, 0x200a00) r2 = getegid() ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000280)=""/236) write$FUSE_CREATE_OPEN(r0, &(0x7f00000001c0)={0xa0, 0x0, 0x8, {{0x2, 0x0, 0x100, 0x7, 0x2, 0x4, {0x6, 0x7fffffff, 0x0, 0x9b, 0xe86f, 0x3, 0x5, 0x4, 0xda, 0x1, 0x9c, r1, r2, 0x7}}, {0x0, 0x6}}}, 0xa0) 04:53:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 1058.641909][T29961] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:58 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x8000, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x800, 0x0) getsockopt$llc_int(r2, 0x10c, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioprio_get$pid(0x2, r1) fchmodat(r2, &(0x7f00000001c0)='./file0\x00', 0x81) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000180)={0x2, 0x0, 0x6, 0xffe0000000000000}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f00000000c0), 0x0, 0x0) 04:53:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}]}, 0x2c}}, 0x0) [ 1058.800558][T29961] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:58 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x12e, 0x10000}], 0x0, 0x0) 04:53:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}}]}, 0x2c}}, 0x0) [ 1058.853412][T29918] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1058.869256][T29918] BTRFS error (device loop5): superblock checksum mismatch 04:53:58 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000010fff00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1058.914051][T29918] BTRFS error (device loop5): open_ctree failed 04:53:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}]}, 0x2c}}, 0x0) [ 1059.128190][T30159] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1059.230809][T30159] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:59 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xf00000000000000]}, 0x63) 04:53:59 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x12e, 0x10000}], 0x0, 0x0) 04:53:59 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 04:53:59 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b70", 0x103, 0x10000}], 0x0, 0x0) 04:53:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}]}, 0x2c}}, 0x0) 04:53:59 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000004004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1059.640461][T30184] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:59 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x103, 0x10000}], 0x0, 0x0) 04:53:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}}]}, 0x2c}}, 0x0) [ 1059.769523][T30184] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:53:59 executing program 0: r0 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000780)={0x40000000}) mq_notify(0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x2, r0}) fgetxattr(0xffffffffffffffff, &(0x7f0000000800)=ANY=[], 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, 0x0, &(0x7f0000000480)) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0xffffffffffffffd3, 0x34, 0x100000000000000}, 0xfffffefd) ptrace$peek(0x3, r0, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x406, r1) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) 04:53:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13000000]}}]}, 0x2c}}, 0x0) [ 1059.848381][T30178] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1059.860758][T30178] BTRFS error (device loop5): superblock checksum mismatch 04:53:59 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000014000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1059.893956][T30178] BTRFS error (device loop5): open_ctree failed 04:53:59 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b7028a889a73f1803a08092ccde170ff6041a9ca844e75a67c86d665069cfc07128e5a406634aae87d13ed0d5", 0x12e, 0x10000}], 0x0, 0x0) [ 1060.121244][T30213] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1060.220294][T30213] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1060.261836][T30218] BTRFS: device label >ÐÕ devid 17487635432702809553 transid 756082810144684242 /dev/loop1 [ 1060.358453][T30218] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1060.368169][T30218] BTRFS error (device loop1): superblock checksum mismatch [ 1060.379111][T30218] BTRFS error (device loop1): open_ctree failed 04:54:00 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1000000000000000]}, 0x63) 04:54:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21050000]}}]}, 0x2c}}, 0x0) 04:54:00 executing program 0: r0 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000780)={0x40000000}) mq_notify(0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x2, r0}) fgetxattr(0xffffffffffffffff, &(0x7f0000000800)=ANY=[], 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, 0x0, &(0x7f0000000480)) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0xffffffffffffffd3, 0x34, 0x100000000000000}, 0xfffffefd) ptrace$peek(0x3, r0, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x406, r1) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) 04:54:00 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1", 0xad, 0x10000}], 0x0, 0x0) 04:54:00 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000024000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:00 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x12e, 0x10000}], 0x0, 0x0) 04:54:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}]}, 0x2c}}, 0x0) [ 1060.618689][T30239] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1060.713622][T30241] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 756082810144684242 /dev/loop5 04:54:00 executing program 0: r0 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000780)={0x40000000}) mq_notify(0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x2, r0}) fgetxattr(0xffffffffffffffff, &(0x7f0000000800)=ANY=[], 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, 0x0, &(0x7f0000000480)) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0xffffffffffffffd3, 0x34, 0x100000000000000}, 0xfffffefd) ptrace$peek(0x3, r0, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x406, r1) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) 04:54:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}]}, 0x2c}}, 0x0) [ 1060.810993][T30239] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1060.858540][T30238] BTRFS error (device loop5): superblock checksum mismatch [ 1060.885235][T30238] BTRFS error (device loop5): open_ctree failed 04:54:00 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000034000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1060.919021][T30241] BTRFS error (device loop5): superblock checksum mismatch 04:54:00 executing program 1: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000780)={0x40000000}) mq_notify(0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x2}) fgetxattr(0xffffffffffffffff, &(0x7f0000000800)=ANY=[], 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, 0x0, &(0x7f0000000480)) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xffffffffffffffd3, 0x34, 0x100000000000000}, 0xfffffefd) ptrace$peek(0x3, 0x0, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) 04:54:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000]}}]}, 0x2c}}, 0x0) [ 1061.043836][T30241] BTRFS error (device loop5): open_ctree failed [ 1061.196019][T30274] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1061.301636][T30274] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:01 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1100000000000000]}, 0x63) 04:54:01 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000780)={0x40000000}) mq_notify(0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x2}) fgetxattr(0xffffffffffffffff, &(0x7f0000000800)=ANY=[], 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, 0x0, &(0x7f0000000480)) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xffffffffffffffd3, 0x34, 0x100000000000000}, 0xfffffefd) ptrace$peek(0x3, 0x0, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) 04:54:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}}]}, 0x2c}}, 0x0) 04:54:01 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1", 0xad, 0x10000}], 0x0, 0x0) 04:54:01 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000044000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}}]}, 0x2c}}, 0x0) 04:54:01 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000780)={0x40000000}) mq_notify(0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x2}) fgetxattr(0xffffffffffffffff, &(0x7f0000000800)=ANY=[], 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, 0x0, &(0x7f0000000480)) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xffffffffffffffd3, 0x34, 0x100000000000000}, 0xfffffefd) ptrace$peek(0x3, 0x0, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) [ 1061.642299][T30301] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1061.747230][T30301] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:01 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:54:01 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:54:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff]}}]}, 0x2c}}, 0x0) 04:54:01 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000054000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:01 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000780)={0x40000000}) mq_notify(0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x2}) fgetxattr(0xffffffffffffffff, &(0x7f0000000800)=ANY=[], 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, 0x0, &(0x7f0000000480)) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xffffffffffffffd3, 0x34, 0x100000000000000}, 0xfffffefd) ptrace$peek(0x3, 0x0, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) [ 1062.063148][T30332] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1062.263591][T30332] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:02 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 04:54:02 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1200000000000000]}, 0x63) 04:54:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff]}}]}, 0x2c}}, 0x0) 04:54:02 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000780)={0x40000000}) mq_notify(0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x2, r0}) fgetxattr(0xffffffffffffffff, &(0x7f0000000800)=ANY=[], 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, 0x0, &(0x7f0000000480)) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0xffffffffffffffd3, 0x34, 0x100000000000000}, 0xfffffefd) ptrace$peek(0x3, r0, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x406, r1) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000080)) 04:54:02 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 04:54:02 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000064000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:02 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) [ 1062.612416][T30358] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}}]}, 0x2c}}, 0x0) 04:54:02 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000074000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:02 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) 04:54:02 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) 04:54:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}}]}, 0x2c}}, 0x0) [ 1062.867595][T30375] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}]}, 0x2c}}, 0x0) [ 1062.977267][T30375] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1063.106275][T30384] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1063.115454][T30384] BTRFS error (device loop5): superblock checksum mismatch [ 1063.152255][T30384] BTRFS error (device loop5): open_ctree failed 04:54:03 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1300000000000000]}, 0x63) 04:54:03 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) 04:54:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e]}}]}, 0x2c}}, 0x0) 04:54:03 executing program 1: bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) 04:54:03 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) 04:54:03 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000084000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0]}}]}, 0x2c}}, 0x0) [ 1063.592291][T30407] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:03 executing program 0: bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b7028a889a73f1803a08092ccde170ff6041a9ca844e75a67c86d665069cfc07128e5a406634aae87d13ed0d5fb62d3f2ed2eea2480d6525417bd176b15974760833140803ed3080cb1ea09851b99c30ad32b6388ca48e6", 0x159, 0x10000}], 0x0, 0x0) [ 1063.715186][T30406] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop1 new:/dev/loop5 [ 1063.732979][T30407] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}]}, 0x2c}}, 0x0) 04:54:03 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000094000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:03 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) [ 1063.778161][T30411] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1063.796521][T30411] BTRFS error (device loop1): superblock checksum mismatch [ 1063.867980][T30411] BTRFS error (device loop1): open_ctree failed 04:54:03 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) [ 1064.045221][T30440] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1064.179370][T30440] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1064.217391][T30447] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 1064.225949][T30447] BTRFS error (device loop5): superblock checksum mismatch [ 1064.259814][T30447] BTRFS error (device loop5): open_ctree failed 04:54:04 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1400000000000000]}, 0x63) 04:54:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}]}, 0x2c}}, 0x0) 04:54:04 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:04 executing program 1: bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) 04:54:04 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000010000000a4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:04 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b7028a889a73f1803a08092ccde170ff6041a9ca844e75a67c86d665069cfc07128e5a406634aae87d13ed0d5fb62d3f2ed2eea2480d6525417bd176b15974760833140803ed3080cb1ea09851b99c30ad32b6388ca48e6", 0x159, 0x10000}], 0x0, 0x0) [ 1064.620989][T30464] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}]}, 0x2c}}, 0x0) 04:54:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1064.769752][T30464] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1064.782514][T30473] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:17487635432702809553 old:/dev/loop1 new:/dev/loop5 04:54:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}]}, 0x2c}}, 0x0) [ 1064.842206][T30466] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1064.858465][T30466] BTRFS error (device loop1): superblock checksum mismatch 04:54:04 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000004104000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1064.908708][T30466] BTRFS error (device loop1): open_ctree failed 04:54:04 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1065.084470][T30500] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1065.103218][T30504] FAULT_INJECTION: forcing a failure. [ 1065.103218][T30504] name failslab, interval 1, probability 0, space 0, times 0 [ 1065.133660][T30504] CPU: 0 PID: 30504 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1065.143101][T30504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1065.153192][T30504] Call Trace: [ 1065.156502][T30504] dump_stack+0x172/0x1f0 [ 1065.160945][T30504] should_fail.cold+0xa/0x15 [ 1065.165570][T30504] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1065.171624][T30504] ? ___might_sleep+0x163/0x280 [ 1065.176698][T30504] __should_failslab+0x121/0x190 [ 1065.181771][T30504] should_failslab+0x9/0x14 [ 1065.186478][T30504] __kmalloc+0x2dc/0x740 [ 1065.190846][T30504] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1065.197128][T30504] ? fput_many+0x12c/0x1a0 [ 1065.201679][T30504] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1065.207963][T30504] ? strnlen_user+0x1f0/0x280 [ 1065.212649][T30504] ? __x64_sys_memfd_create+0x13c/0x470 [ 1065.218214][T30504] __x64_sys_memfd_create+0x13c/0x470 [ 1065.223594][T30504] ? memfd_fcntl+0x1550/0x1550 [ 1065.228362][T30504] ? do_syscall_64+0x26/0x610 [ 1065.233056][T30504] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1065.243811][T30504] ? trace_hardirqs_on+0x67/0x230 [ 1065.249098][T30504] do_syscall_64+0x103/0x610 [ 1065.253718][T30504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1065.259614][T30504] RIP: 0033:0x458209 [ 1065.263504][T30504] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1065.283671][T30504] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1065.292244][T30504] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1065.300232][T30504] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1065.308225][T30504] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1065.316400][T30504] R10: 0000000000010000 R11: 0000000000000246 R12: 00007feecb62f6d4 [ 1065.324370][T30504] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1065.395874][T30500] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:05 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1500000000000000]}, 0x63) 04:54:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:05 executing program 1: bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) 04:54:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}]}, 0x2c}}, 0x0) 04:54:05 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000204000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1065.603523][T30520] FAULT_INJECTION: forcing a failure. [ 1065.603523][T30520] name failslab, interval 1, probability 0, space 0, times 0 [ 1065.632073][T30520] CPU: 0 PID: 30520 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1065.641255][T30520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1065.651329][T30520] Call Trace: [ 1065.654649][T30520] dump_stack+0x172/0x1f0 [ 1065.659012][T30520] should_fail.cold+0xa/0x15 [ 1065.663821][T30520] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1065.669664][T30520] ? ___might_sleep+0x163/0x280 [ 1065.674558][T30520] __should_failslab+0x121/0x190 [ 1065.679543][T30520] ? shmem_destroy_callback+0xc0/0xc0 [ 1065.685038][T30520] should_failslab+0x9/0x14 [ 1065.689763][T30520] kmem_cache_alloc+0x2b2/0x6f0 [ 1065.694643][T30520] ? __alloc_fd+0x430/0x530 [ 1065.699251][T30520] ? shmem_destroy_callback+0xc0/0xc0 [ 1065.699268][T30520] shmem_alloc_inode+0x1c/0x50 [ 1065.699283][T30520] alloc_inode+0x66/0x190 [ 1065.699308][T30520] new_inode_pseudo+0x19/0xf0 [ 1065.718629][T30520] new_inode+0x1f/0x40 [ 1065.722733][T30520] shmem_get_inode+0x84/0x780 [ 1065.722755][T30520] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1065.722769][T30520] shmem_file_setup+0x66/0x90 [ 1065.722785][T30520] __x64_sys_memfd_create+0x2a2/0x470 [ 1065.722798][T30520] ? memfd_fcntl+0x1550/0x1550 [ 1065.722815][T30520] ? do_syscall_64+0x26/0x610 [ 1065.722833][T30520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1065.722849][T30520] ? trace_hardirqs_on+0x67/0x230 [ 1065.722868][T30520] do_syscall_64+0x103/0x610 [ 1065.722890][T30520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1065.722902][T30520] RIP: 0033:0x458209 [ 1065.722917][T30520] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:54:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1065.722925][T30520] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1065.722939][T30520] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1065.722947][T30520] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1065.722963][T30520] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1065.831379][T30520] R10: 0000000000010000 R11: 0000000000000246 R12: 00007feecb62f6d4 [ 1065.839370][T30520] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}]}, 0x2c}}, 0x0) [ 1065.853530][T30523] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:05 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1065.901886][T30529] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 1065.923625][T30529] BTRFS error (device loop1): superblock checksum mismatch 04:54:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1065.955986][T30529] BTRFS error (device loop1): open_ctree failed [ 1065.957335][T30523] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000010204000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1066.096870][T30548] FAULT_INJECTION: forcing a failure. [ 1066.096870][T30548] name failslab, interval 1, probability 0, space 0, times 0 [ 1066.125072][T30548] CPU: 1 PID: 30548 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1066.134510][T30548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1066.144672][T30548] Call Trace: [ 1066.148035][T30548] dump_stack+0x172/0x1f0 [ 1066.152397][T30548] should_fail.cold+0xa/0x15 [ 1066.157108][T30548] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1066.163124][T30548] ? ___might_sleep+0x163/0x280 [ 1066.168004][T30548] __should_failslab+0x121/0x190 [ 1066.172997][T30548] should_failslab+0x9/0x14 [ 1066.177510][T30548] kmem_cache_alloc+0x2b2/0x6f0 [ 1066.182455][T30548] ? current_time+0x6b/0x140 [ 1066.187034][T30548] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1066.192830][T30548] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1066.198127][T30548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1066.204357][T30548] ? timespec64_trunc+0xf0/0x180 [ 1066.209375][T30548] __d_alloc+0x2e/0x8c0 [ 1066.213717][T30548] d_alloc_pseudo+0x1e/0x30 [ 1066.218207][T30548] alloc_file_pseudo+0xe2/0x280 [ 1066.223177][T30548] ? alloc_file+0x4d0/0x4d0 [ 1066.227679][T30548] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1066.233922][T30548] __shmem_file_setup.part.0+0x108/0x2b0 [ 1066.240227][T30548] shmem_file_setup+0x66/0x90 [ 1066.244903][T30548] __x64_sys_memfd_create+0x2a2/0x470 [ 1066.250264][T30548] ? memfd_fcntl+0x1550/0x1550 [ 1066.255056][T30548] ? do_syscall_64+0x26/0x610 [ 1066.259727][T30548] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1066.265094][T30548] ? trace_hardirqs_on+0x67/0x230 [ 1066.270115][T30548] do_syscall_64+0x103/0x610 [ 1066.274699][T30548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1066.280681][T30548] RIP: 0033:0x458209 [ 1066.284825][T30548] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1066.304416][T30548] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1066.312823][T30548] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1066.320983][T30548] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1066.328952][T30548] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1066.337219][T30548] R10: 0000000000010000 R11: 0000000000000246 R12: 00007feecb62f6d4 [ 1066.345260][T30548] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1066.487772][T30557] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1066.529238][T30557] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:06 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x1800000000000000]}, 0x63) 04:54:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}]}, 0x2c}}, 0x0) 04:54:06 executing program 1 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:06 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:06 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000234000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1066.703852][T30580] FAULT_INJECTION: forcing a failure. [ 1066.703852][T30580] name failslab, interval 1, probability 0, space 0, times 0 [ 1066.703864][T30573] FAULT_INJECTION: forcing a failure. [ 1066.703864][T30573] name failslab, interval 1, probability 0, space 0, times 0 [ 1066.737696][T30571] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1066.749413][T30573] CPU: 1 PID: 30573 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1066.758926][T30573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1066.769953][T30573] Call Trace: [ 1066.773264][T30573] dump_stack+0x172/0x1f0 [ 1066.778024][T30573] should_fail.cold+0xa/0x15 [ 1066.782961][T30573] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1066.788944][T30573] ? ___might_sleep+0x163/0x280 [ 1066.793963][T30573] __should_failslab+0x121/0x190 [ 1066.798917][T30573] should_failslab+0x9/0x14 [ 1066.803452][T30573] __kmalloc+0x2dc/0x740 [ 1066.807913][T30573] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1066.814253][T30573] ? fput_many+0x12c/0x1a0 [ 1066.818846][T30573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1066.825267][T30573] ? strnlen_user+0x1f0/0x280 [ 1066.829930][T30573] ? __x64_sys_memfd_create+0x13c/0x470 [ 1066.835483][T30573] __x64_sys_memfd_create+0x13c/0x470 [ 1066.840842][T30573] ? memfd_fcntl+0x1550/0x1550 [ 1066.845801][T30573] ? do_syscall_64+0x26/0x610 [ 1066.850657][T30573] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1066.856226][T30573] ? trace_hardirqs_on+0x67/0x230 [ 1066.861242][T30573] do_syscall_64+0x103/0x610 [ 1066.866263][T30573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1066.872382][T30573] RIP: 0033:0x458209 [ 1066.876267][T30573] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1066.895943][T30573] RSP: 002b:00007f8b673d6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1066.904357][T30573] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1066.912312][T30573] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1066.920326][T30573] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1066.928284][T30573] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f8b673d76d4 [ 1066.936352][T30573] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000004 04:54:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}]}, 0x2c}}, 0x0) 04:54:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:06 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000010000002d4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1066.947199][T30580] CPU: 1 PID: 30580 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1066.956344][T30580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1066.966692][T30580] Call Trace: [ 1066.970020][T30580] dump_stack+0x172/0x1f0 [ 1066.974382][T30580] should_fail.cold+0xa/0x15 [ 1066.979020][T30580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1066.984896][T30580] ? ___might_sleep+0x163/0x280 [ 1066.989778][T30580] __should_failslab+0x121/0x190 [ 1066.994829][T30580] should_failslab+0x9/0x14 [ 1066.999374][T30580] kmem_cache_alloc+0x2b2/0x6f0 04:54:06 executing program 1 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1067.004261][T30580] __alloc_file+0x27/0x300 [ 1067.008699][T30580] alloc_empty_file+0x72/0x170 [ 1067.013569][T30580] alloc_file+0x5e/0x4d0 [ 1067.018221][T30580] alloc_file_pseudo+0x189/0x280 [ 1067.023293][T30580] ? alloc_file+0x4d0/0x4d0 [ 1067.027923][T30580] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1067.034384][T30580] __shmem_file_setup.part.0+0x108/0x2b0 [ 1067.040169][T30580] shmem_file_setup+0x66/0x90 [ 1067.045213][T30580] __x64_sys_memfd_create+0x2a2/0x470 [ 1067.050685][T30580] ? memfd_fcntl+0x1550/0x1550 [ 1067.055454][T30580] ? do_syscall_64+0x26/0x610 [ 1067.060151][T30580] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1067.065449][T30580] ? trace_hardirqs_on+0x67/0x230 [ 1067.070589][T30580] do_syscall_64+0x103/0x610 [ 1067.075190][T30580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1067.081086][T30580] RIP: 0033:0x458209 [ 1067.085030][T30580] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:54:06 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1067.104633][T30580] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1067.113056][T30580] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1067.121074][T30580] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1067.129415][T30580] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1067.137379][T30580] R10: 0000000000010000 R11: 0000000000000246 R12: 00007feecb62f6d4 [ 1067.145358][T30580] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1067.275532][T30592] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}]}, 0x2c}}, 0x0) [ 1067.321058][T30598] FAULT_INJECTION: forcing a failure. [ 1067.321058][T30598] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.338410][T30598] CPU: 0 PID: 30598 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1067.338954][T30599] FAULT_INJECTION: forcing a failure. [ 1067.338954][T30599] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.347650][T30598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.347660][T30598] Call Trace: [ 1067.347689][T30598] dump_stack+0x172/0x1f0 [ 1067.347710][T30598] should_fail.cold+0xa/0x15 [ 1067.347731][T30598] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1067.347750][T30598] ? ___might_sleep+0x163/0x280 [ 1067.347770][T30598] __should_failslab+0x121/0x190 [ 1067.347784][T30598] should_failslab+0x9/0x14 [ 1067.347796][T30598] kmem_cache_alloc+0x2b2/0x6f0 [ 1067.347812][T30598] ? rcu_read_lock_sched_held+0x110/0x130 [ 1067.347827][T30598] ? kmem_cache_alloc+0x32e/0x6f0 [ 1067.347848][T30598] security_file_alloc+0x39/0x170 [ 1067.347867][T30598] __alloc_file+0xac/0x300 [ 1067.347884][T30598] alloc_empty_file+0x72/0x170 [ 1067.347902][T30598] alloc_file+0x5e/0x4d0 [ 1067.347919][T30598] alloc_file_pseudo+0x189/0x280 [ 1067.347936][T30598] ? alloc_file+0x4d0/0x4d0 [ 1067.347953][T30598] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1067.347977][T30598] __shmem_file_setup.part.0+0x108/0x2b0 [ 1067.348006][T30598] shmem_file_setup+0x66/0x90 [ 1067.348021][T30598] __x64_sys_memfd_create+0x2a2/0x470 [ 1067.348035][T30598] ? memfd_fcntl+0x1550/0x1550 [ 1067.348053][T30598] ? do_syscall_64+0x26/0x610 [ 1067.348070][T30598] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1067.348086][T30598] ? trace_hardirqs_on+0x67/0x230 [ 1067.348105][T30598] do_syscall_64+0x103/0x610 [ 1067.348125][T30598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1067.348137][T30598] RIP: 0033:0x458209 [ 1067.348152][T30598] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1067.348160][T30598] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1067.348174][T30598] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1067.348183][T30598] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1067.348191][T30598] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1067.348200][T30598] R10: 0000000000010000 R11: 0000000000000246 R12: 00007feecb62f6d4 [ 1067.348208][T30598] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1067.576039][T30599] CPU: 0 PID: 30599 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1067.585262][T30599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.595437][T30599] Call Trace: [ 1067.598822][T30599] dump_stack+0x172/0x1f0 [ 1067.603157][T30599] should_fail.cold+0xa/0x15 [ 1067.607746][T30599] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1067.613576][T30599] ? ___might_sleep+0x163/0x280 [ 1067.618457][T30599] __should_failslab+0x121/0x190 [ 1067.623434][T30599] ? shmem_destroy_callback+0xc0/0xc0 [ 1067.628841][T30599] should_failslab+0x9/0x14 [ 1067.633361][T30599] kmem_cache_alloc+0x2b2/0x6f0 [ 1067.638233][T30599] ? __alloc_fd+0x430/0x530 [ 1067.642916][T30599] ? shmem_destroy_callback+0xc0/0xc0 [ 1067.648290][T30599] shmem_alloc_inode+0x1c/0x50 [ 1067.653054][T30599] alloc_inode+0x66/0x190 [ 1067.657376][T30599] new_inode_pseudo+0x19/0xf0 [ 1067.662059][T30599] new_inode+0x1f/0x40 [ 1067.666128][T30599] shmem_get_inode+0x84/0x780 [ 1067.670895][T30599] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1067.676530][T30599] shmem_file_setup+0x66/0x90 [ 1067.681215][T30599] __x64_sys_memfd_create+0x2a2/0x470 [ 1067.686687][T30599] ? memfd_fcntl+0x1550/0x1550 [ 1067.691707][T30599] ? do_syscall_64+0x26/0x610 [ 1067.696373][T30599] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1067.701671][T30599] ? trace_hardirqs_on+0x67/0x230 [ 1067.706713][T30599] do_syscall_64+0x103/0x610 [ 1067.711303][T30599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1067.717179][T30599] RIP: 0033:0x458209 [ 1067.721201][T30599] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1067.743662][T30599] RSP: 002b:00007f8b673d6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1067.752069][T30599] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1067.760033][T30599] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1067.768055][T30599] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1067.776025][T30599] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f8b673d76d4 [ 1067.784093][T30599] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000004 [ 1067.805245][T30592] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:07 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x4000000000000000]}, 0x63) 04:54:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:07 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:07 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000010000003f4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}]}, 0x2c}}, 0x0) 04:54:07 executing program 1 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1068.081790][T30618] FAULT_INJECTION: forcing a failure. [ 1068.081790][T30618] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1068.125437][T30620] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1068.139471][T30626] FAULT_INJECTION: forcing a failure. [ 1068.139471][T30626] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.166992][T30618] CPU: 0 PID: 30618 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1068.176239][T30618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.186428][T30618] Call Trace: [ 1068.189751][T30618] dump_stack+0x172/0x1f0 [ 1068.194220][T30618] should_fail.cold+0xa/0x15 [ 1068.198865][T30618] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1068.204716][T30618] ? ___might_sleep+0x163/0x280 [ 1068.209697][T30618] should_fail_alloc_page+0x50/0x60 [ 1068.215012][T30618] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1068.220434][T30618] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1068.226364][T30618] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1068.232781][T30618] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1068.239028][T30618] alloc_pages_vma+0xdd/0x540 [ 1068.243721][T30618] shmem_alloc_page+0xc0/0x180 [ 1068.248580][T30618] ? shmem_swapin+0x1a0/0x1a0 [ 1068.253464][T30618] ? lock_downgrade+0x880/0x880 [ 1068.258410][T30618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1068.264860][T30618] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1068.270680][T30618] ? __vm_enough_memory+0x320/0x5a0 [ 1068.275894][T30618] shmem_alloc_and_acct_page+0x165/0x970 [ 1068.281980][T30618] shmem_getpage_gfp+0x43b/0x2500 [ 1068.287037][T30618] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 1068.293218][T30618] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1068.299032][T30618] ? current_time+0x6b/0x140 [ 1068.303625][T30618] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1068.309493][T30618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1068.315747][T30618] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1068.321672][T30618] shmem_write_begin+0x105/0x1e0 [ 1068.326632][T30618] generic_perform_write+0x231/0x530 [ 1068.331946][T30618] ? page_endio+0x780/0x780 [ 1068.336455][T30618] ? current_time+0x140/0x140 [ 1068.341147][T30618] ? lock_acquire+0x16f/0x3f0 [ 1068.345848][T30618] __generic_file_write_iter+0x25e/0x630 [ 1068.351614][T30618] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1068.357443][T30618] generic_file_write_iter+0x360/0x610 [ 1068.362922][T30618] ? __generic_file_write_iter+0x630/0x630 [ 1068.368767][T30618] ? aa_path_link+0x460/0x460 04:54:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}]}, 0x2c}}, 0x0) [ 1068.373631][T30618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1068.379879][T30618] ? iov_iter_init+0xee/0x220 [ 1068.384693][T30618] new_sync_write+0x4c7/0x760 [ 1068.389388][T30618] ? default_llseek+0x2e0/0x2e0 [ 1068.394252][T30618] ? lock_downgrade+0x880/0x880 [ 1068.399134][T30618] __vfs_write+0xe4/0x110 [ 1068.403507][T30618] vfs_write+0x20c/0x580 [ 1068.407765][T30618] ksys_pwrite64+0x183/0x1c0 [ 1068.412525][T30618] ? __ia32_sys_pread64+0xf0/0xf0 [ 1068.417566][T30618] ? trace_hardirqs_on_thunk+0x1a/0x1c 04:54:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1068.423122][T30618] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1068.428592][T30618] ? do_syscall_64+0x26/0x610 [ 1068.433287][T30618] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.439362][T30618] ? do_syscall_64+0x26/0x610 [ 1068.444053][T30618] __x64_sys_pwrite64+0x97/0xf0 [ 1068.448922][T30618] do_syscall_64+0x103/0x610 [ 1068.453537][T30618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.459444][T30618] RIP: 0033:0x412207 [ 1068.463562][T30618] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1068.483275][T30618] RSP: 002b:00007feecb62ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1068.491787][T30618] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412207 [ 1068.499790][T30618] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 1068.507767][T30618] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1068.515745][T30618] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1068.523816][T30618] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1068.536402][T30626] CPU: 0 PID: 30626 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1068.545553][T30626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.555981][T30626] Call Trace: [ 1068.559302][T30626] dump_stack+0x172/0x1f0 [ 1068.563674][T30626] should_fail.cold+0xa/0x15 [ 1068.568295][T30626] ? fault_create_debugfs_attr+0x1e0/0x1e0 04:54:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1068.574134][T30626] ? ___might_sleep+0x163/0x280 [ 1068.579015][T30626] __should_failslab+0x121/0x190 [ 1068.583983][T30626] should_failslab+0x9/0x14 [ 1068.588542][T30626] kmem_cache_alloc+0x2b2/0x6f0 [ 1068.593691][T30626] ? retint_kernel+0x2d/0x2d [ 1068.598398][T30626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1068.604676][T30626] ? timespec64_trunc+0xf0/0x180 [ 1068.609652][T30626] __d_alloc+0x2e/0x8c0 [ 1068.613832][T30626] d_alloc_pseudo+0x1e/0x30 [ 1068.618357][T30626] alloc_file_pseudo+0xe2/0x280 [ 1068.623328][T30626] ? alloc_file+0x4d0/0x4d0 [ 1068.627849][T30626] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1068.634351][T30626] __shmem_file_setup.part.0+0x108/0x2b0 [ 1068.640019][T30626] shmem_file_setup+0x66/0x90 [ 1068.644739][T30626] __x64_sys_memfd_create+0x2a2/0x470 [ 1068.650524][T30626] ? memfd_fcntl+0x1550/0x1550 [ 1068.655336][T30626] ? memfd_fcntl+0x1550/0x1550 [ 1068.660135][T30626] do_syscall_64+0x103/0x610 [ 1068.664750][T30626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.670734][T30626] RIP: 0033:0x458209 04:54:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1068.674803][T30626] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1068.694760][T30626] RSP: 002b:00007f8b673d6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1068.703893][T30626] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1068.711895][T30626] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1068.720177][T30626] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 04:54:08 executing program 1 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1068.728169][T30626] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f8b673d76d4 [ 1068.736254][T30626] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000004 [ 1068.792074][T30620] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:08 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1068.926980][T30647] FAULT_INJECTION: forcing a failure. [ 1068.926980][T30647] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.969658][T30651] FAULT_INJECTION: forcing a failure. [ 1068.969658][T30651] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.971340][T30647] CPU: 0 PID: 30647 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1068.992270][T30647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.002337][T30647] Call Trace: [ 1069.005638][T30647] dump_stack+0x172/0x1f0 [ 1069.009964][T30647] should_fail.cold+0xa/0x15 [ 1069.014554][T30647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1069.020442][T30647] ? ___might_sleep+0x163/0x280 [ 1069.025295][T30647] __should_failslab+0x121/0x190 [ 1069.030232][T30647] should_failslab+0x9/0x14 [ 1069.034739][T30647] kmem_cache_alloc+0x2b2/0x6f0 [ 1069.039710][T30647] __alloc_file+0x27/0x300 [ 1069.044121][T30647] alloc_empty_file+0x72/0x170 [ 1069.048881][T30647] alloc_file+0x5e/0x4d0 [ 1069.053233][T30647] alloc_file_pseudo+0x189/0x280 [ 1069.058163][T30647] ? alloc_file+0x4d0/0x4d0 [ 1069.062751][T30647] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1069.069001][T30647] __shmem_file_setup.part.0+0x108/0x2b0 [ 1069.074642][T30647] shmem_file_setup+0x66/0x90 [ 1069.079325][T30647] __x64_sys_memfd_create+0x2a2/0x470 [ 1069.084720][T30647] ? memfd_fcntl+0x1550/0x1550 [ 1069.089474][T30647] ? do_syscall_64+0x26/0x610 [ 1069.094510][T30647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1069.099804][T30647] ? trace_hardirqs_on+0x67/0x230 [ 1069.104841][T30647] do_syscall_64+0x103/0x610 [ 1069.109432][T30647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.115319][T30647] RIP: 0033:0x458209 [ 1069.119223][T30647] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1069.138996][T30647] RSP: 002b:00007f8b673d6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1069.147525][T30647] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1069.155490][T30647] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1069.163580][T30647] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1069.171629][T30647] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f8b673d76d4 [ 1069.179606][T30647] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000004 [ 1069.187692][T30651] CPU: 1 PID: 30651 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1069.196892][T30651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.207313][T30651] Call Trace: [ 1069.210606][T30651] dump_stack+0x172/0x1f0 [ 1069.215051][T30651] should_fail.cold+0xa/0x15 [ 1069.219658][T30651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1069.229072][T30651] __should_failslab+0x121/0x190 [ 1069.234040][T30651] should_failslab+0x9/0x14 [ 1069.238545][T30651] kmem_cache_alloc+0x47/0x6f0 [ 1069.243297][T30651] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1069.249034][T30651] xas_alloc+0x2df/0x3d0 [ 1069.258943][T30651] xas_create+0x2cd/0xff0 [ 1069.263387][T30651] xas_create_range+0x198/0x5d0 [ 1069.268407][T30651] shmem_add_to_page_cache+0x6f3/0x1200 [ 1069.274042][T30651] ? shmem_writepage+0xe90/0xe90 [ 1069.279060][T30651] shmem_getpage_gfp+0x6db/0x2500 [ 1069.284187][T30651] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 1069.290340][T30651] ? current_time+0x6b/0x140 [ 1069.294929][T30651] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1069.300736][T30651] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1069.307094][T30651] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1069.313037][T30651] shmem_write_begin+0x105/0x1e0 [ 1069.317970][T30651] generic_perform_write+0x231/0x530 [ 1069.323422][T30651] ? page_endio+0x780/0x780 [ 1069.332775][T30651] ? current_time+0x140/0x140 [ 1069.337486][T30651] ? lock_acquire+0x16f/0x3f0 [ 1069.342165][T30651] __generic_file_write_iter+0x25e/0x630 [ 1069.347828][T30651] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1069.353554][T30651] generic_file_write_iter+0x360/0x610 [ 1069.359055][T30651] ? __generic_file_write_iter+0x630/0x630 [ 1069.364858][T30651] ? aa_path_link+0x460/0x460 [ 1069.369530][T30651] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1069.376285][T30651] ? iov_iter_init+0xee/0x220 [ 1069.380955][T30651] new_sync_write+0x4c7/0x760 [ 1069.385875][T30651] ? default_llseek+0x2e0/0x2e0 [ 1069.390721][T30651] ? lock_downgrade+0x880/0x880 [ 1069.395614][T30651] __vfs_write+0xe4/0x110 [ 1069.399938][T30651] vfs_write+0x20c/0x580 [ 1069.404359][T30651] ksys_pwrite64+0x183/0x1c0 [ 1069.408947][T30651] ? __ia32_sys_pread64+0xf0/0xf0 [ 1069.413986][T30651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1069.419453][T30651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1069.425022][T30651] ? do_syscall_64+0x26/0x610 [ 1069.429824][T30651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.435886][T30651] ? do_syscall_64+0x26/0x610 [ 1069.440766][T30651] __x64_sys_pwrite64+0x97/0xf0 [ 1069.446001][T30651] do_syscall_64+0x103/0x610 [ 1069.450587][T30651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.456465][T30651] RIP: 0033:0x412207 [ 1069.460443][T30651] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1069.482515][T30651] RSP: 002b:00007feecb62ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1069.491115][T30651] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412207 [ 1069.500362][T30651] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 1069.508428][T30651] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 04:54:09 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}, 0x63) 04:54:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}]}, 0x2c}}, 0x0) 04:54:09 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000404000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1069.518707][T30651] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1069.526904][T30651] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:09 executing program 1 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}]}, 0x2c}}, 0x0) 04:54:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1069.691803][T30660] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1069.719747][T30669] FAULT_INJECTION: forcing a failure. [ 1069.719747][T30669] name failslab, interval 1, probability 0, space 0, times 0 04:54:09 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1069.774761][T30669] CPU: 0 PID: 30669 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1069.784461][T30669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.794840][T30669] Call Trace: [ 1069.798252][T30669] dump_stack+0x172/0x1f0 [ 1069.802950][T30669] should_fail.cold+0xa/0x15 [ 1069.808087][T30669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1069.814032][T30669] ? ___might_sleep+0x163/0x280 [ 1069.818917][T30669] __should_failslab+0x121/0x190 04:54:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}]}, 0x2c}}, 0x0) 04:54:09 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000484000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1069.824004][T30669] should_failslab+0x9/0x14 [ 1069.828614][T30669] kmem_cache_alloc+0x2b2/0x6f0 [ 1069.833758][T30669] ? rcu_read_lock_sched_held+0x110/0x130 [ 1069.840007][T30669] ? kmem_cache_alloc+0x32e/0x6f0 [ 1069.845075][T30669] security_file_alloc+0x39/0x170 [ 1069.850913][T30669] __alloc_file+0xac/0x300 [ 1069.855655][T30669] alloc_empty_file+0x72/0x170 [ 1069.860446][T30669] alloc_file+0x5e/0x4d0 [ 1069.864817][T30669] alloc_file_pseudo+0x189/0x280 [ 1069.869943][T30669] ? alloc_file+0x4d0/0x4d0 04:54:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1069.874471][T30669] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1069.880749][T30669] __shmem_file_setup.part.0+0x108/0x2b0 [ 1069.886423][T30669] shmem_file_setup+0x66/0x90 [ 1069.891402][T30669] __x64_sys_memfd_create+0x2a2/0x470 [ 1069.896807][T30669] ? memfd_fcntl+0x1550/0x1550 [ 1069.901892][T30669] ? do_syscall_64+0x26/0x610 [ 1069.906978][T30669] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1069.912274][T30669] ? trace_hardirqs_on+0x67/0x230 [ 1069.917327][T30669] do_syscall_64+0x103/0x610 04:54:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1069.921949][T30669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.927852][T30669] RIP: 0033:0x458209 [ 1069.932327][T30669] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1069.952659][T30669] RSP: 002b:00007f8b673d6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1069.961201][T30669] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458209 [ 1069.969564][T30669] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bd167 [ 1069.977864][T30669] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1069.986221][T30669] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f8b673d76d4 [ 1069.994300][T30669] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000004 [ 1070.066177][T30686] FAULT_INJECTION: forcing a failure. [ 1070.066177][T30686] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.118934][T30686] CPU: 0 PID: 30686 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1070.136107][T30686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.146379][T30686] Call Trace: [ 1070.149697][T30686] dump_stack+0x172/0x1f0 [ 1070.154205][T30686] should_fail.cold+0xa/0x15 [ 1070.158964][T30686] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1070.164810][T30686] ? ___might_sleep+0x163/0x280 [ 1070.169695][T30686] __should_failslab+0x121/0x190 [ 1070.174927][T30686] should_failslab+0x9/0x14 [ 1070.179455][T30686] kmem_cache_alloc+0x2b2/0x6f0 [ 1070.184537][T30686] ? lock_downgrade+0x880/0x880 [ 1070.189412][T30686] getname_flags+0xd6/0x5b0 [ 1070.193941][T30686] getname+0x1a/0x20 [ 1070.197849][T30686] do_sys_open+0x2c9/0x5d0 [ 1070.197870][T30686] ? filp_open+0x80/0x80 [ 1070.197891][T30686] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1070.197912][T30686] ? do_syscall_64+0x26/0x610 [ 1070.206658][T30686] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.206679][T30686] ? do_syscall_64+0x26/0x610 [ 1070.206699][T30686] __x64_sys_open+0x7e/0xc0 [ 1070.206718][T30686] do_syscall_64+0x103/0x610 [ 1070.222936][T30686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.222950][T30686] RIP: 0033:0x4121a1 [ 1070.222968][T30686] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1070.232195][T30686] RSP: 002b:00007feecb62ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1070.232210][T30686] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004121a1 [ 1070.232218][T30686] RDX: 00007feecb62eb0a RSI: 0000000000000002 RDI: 00007feecb62eb00 [ 1070.232226][T30686] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1070.232232][T30686] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1070.232238][T30686] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1070.329567][T30692] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1070.378970][T30692] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:10 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3]}, 0x63) 04:54:10 executing program 1 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}]}, 0x2c}}, 0x0) 04:54:10 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:10 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000010000004c4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1070.677508][T30713] FAULT_INJECTION: forcing a failure. [ 1070.677508][T30713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1070.684210][T30716] FAULT_INJECTION: forcing a failure. [ 1070.684210][T30716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1070.704460][T30716] CPU: 1 PID: 30716 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1070.713665][T30716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.723832][T30716] Call Trace: [ 1070.727232][T30716] dump_stack+0x172/0x1f0 [ 1070.731587][T30716] should_fail.cold+0xa/0x15 [ 1070.736194][T30716] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1070.742014][T30716] ? __lock_acquire+0x548/0x3fb0 [ 1070.747142][T30716] should_fail_alloc_page+0x50/0x60 [ 1070.752554][T30716] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1070.757940][T30716] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1070.764195][T30716] ? find_held_lock+0x35/0x130 [ 1070.768969][T30716] ? new_sync_write+0x527/0x760 [ 1070.773915][T30716] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1070.779812][T30716] cache_grow_begin+0x9c/0x860 [ 1070.784582][T30716] ? getname_flags+0xd6/0x5b0 [ 1070.789273][T30716] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1070.795535][T30716] kmem_cache_alloc+0x62d/0x6f0 [ 1070.800408][T30716] ? lock_downgrade+0x880/0x880 [ 1070.805267][T30716] getname_flags+0xd6/0x5b0 [ 1070.809775][T30716] getname+0x1a/0x20 [ 1070.813848][T30716] do_sys_open+0x2c9/0x5d0 [ 1070.818268][T30716] ? filp_open+0x80/0x80 [ 1070.822518][T30716] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1070.828091][T30716] ? do_syscall_64+0x26/0x610 [ 1070.832785][T30716] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.838850][T30716] ? do_syscall_64+0x26/0x610 [ 1070.843553][T30716] __x64_sys_open+0x7e/0xc0 [ 1070.848088][T30716] do_syscall_64+0x103/0x610 [ 1070.852700][T30716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.858592][T30716] RIP: 0033:0x4121a1 [ 1070.862490][T30716] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1070.882614][T30716] RSP: 002b:00007feecb62ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1070.891221][T30716] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004121a1 [ 1070.899279][T30716] RDX: 00007feecb62eb0a RSI: 0000000000000002 RDI: 00007feecb62eb00 [ 1070.907248][T30716] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1070.915242][T30716] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 04:54:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}]}, 0x2c}}, 0x0) [ 1070.923211][T30716] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1070.931479][T30713] CPU: 0 PID: 30713 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1070.940700][T30713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.950759][T30713] Call Trace: [ 1070.950787][T30713] dump_stack+0x172/0x1f0 [ 1070.950811][T30713] should_fail.cold+0xa/0x15 [ 1070.950828][T30713] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1070.950843][T30713] ? ___might_sleep+0x163/0x280 [ 1070.950864][T30713] should_fail_alloc_page+0x50/0x60 [ 1070.950876][T30713] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1070.950892][T30713] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1070.950913][T30713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1070.950926][T30713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1070.950939][T30713] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1070.950955][T30713] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1070.950967][T30713] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1070.950985][T30713] alloc_pages_vma+0xdd/0x540 [ 1070.951006][T30713] shmem_alloc_page+0xc0/0x180 [ 1070.951019][T30713] ? shmem_swapin+0x1a0/0x1a0 [ 1070.951055][T30713] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1070.958779][T30713] ? __vm_enough_memory+0x320/0x5a0 [ 1070.958806][T30713] shmem_alloc_and_acct_page+0x165/0x970 [ 1070.958826][T30713] shmem_getpage_gfp+0x43b/0x2500 [ 1070.958850][T30713] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 1070.958871][T30713] ? retint_kernel+0x2d/0x2d [ 1070.958889][T30713] shmem_write_begin+0x105/0x1e0 04:54:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfc', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1070.958909][T30713] generic_perform_write+0x231/0x530 [ 1070.958931][T30713] ? page_endio+0x780/0x780 [ 1070.958944][T30713] ? current_time+0x140/0x140 [ 1070.958959][T30713] ? __generic_file_write_iter+0x16b/0x630 [ 1070.958973][T30713] ? __generic_file_write_iter+0x1c7/0x630 [ 1070.958994][T30713] __generic_file_write_iter+0x25e/0x630 [ 1070.959011][T30713] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1070.959037][T30713] generic_file_write_iter+0x360/0x610 [ 1070.959060][T30713] ? __generic_file_write_iter+0x630/0x630 [ 1070.992123][T30713] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1070.992141][T30713] ? iov_iter_init+0xee/0x220 [ 1070.992164][T30713] new_sync_write+0x4c7/0x760 [ 1070.992183][T30713] ? default_llseek+0x2e0/0x2e0 [ 1070.992200][T30713] ? retint_kernel+0x2d/0x2d [ 1070.992230][T30713] __vfs_write+0xe4/0x110 [ 1070.992247][T30713] vfs_write+0x20c/0x580 [ 1070.992267][T30713] ksys_pwrite64+0x183/0x1c0 [ 1071.003363][T30713] ? __ia32_sys_pread64+0xf0/0xf0 [ 1071.003383][T30713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1071.003395][T30713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1071.003408][T30713] ? do_syscall_64+0x26/0x610 [ 1071.003426][T30713] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.003437][T30713] ? do_syscall_64+0x26/0x610 [ 1071.003453][T30713] __x64_sys_pwrite64+0x97/0xf0 [ 1071.003467][T30713] do_syscall_64+0x103/0x610 [ 1071.003483][T30713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.003494][T30713] RIP: 0033:0x412207 04:54:10 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4]}, 0x63) [ 1071.003506][T30713] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1071.003514][T30713] RSP: 002b:00007f8b673d6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1071.021781][T30713] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412207 [ 1071.021790][T30713] RDX: 00000000000000c8 RSI: 00000000200008c0 RDI: 0000000000000005 [ 1071.021798][T30713] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 04:54:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}]}, 0x2c}}, 0x0) 04:54:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xf6', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1071.021807][T30713] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 1071.021814][T30713] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000004 [ 1071.305186][T30715] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:11 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:11 executing program 1 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}}]}, 0x2c}}, 0x0) 04:54:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfe', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1071.529474][T30745] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1071.567807][T30756] FAULT_INJECTION: forcing a failure. [ 1071.567807][T30756] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.585210][T30756] CPU: 0 PID: 30756 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1071.594450][T30756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.604815][T30756] Call Trace: [ 1071.608102][T30756] dump_stack+0x172/0x1f0 [ 1071.612451][T30756] should_fail.cold+0xa/0x15 [ 1071.617065][T30756] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1071.622988][T30756] ? ___might_sleep+0x163/0x280 [ 1071.627867][T30756] __should_failslab+0x121/0x190 [ 1071.632819][T30756] should_failslab+0x9/0x14 [ 1071.633698][T30758] FAULT_INJECTION: forcing a failure. [ 1071.633698][T30758] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.637773][T30756] kmem_cache_alloc+0x2b2/0x6f0 [ 1071.655380][T30756] ? rcu_read_lock_sched_held+0x110/0x130 [ 1071.661112][T30756] ? kmem_cache_alloc+0x32e/0x6f0 [ 1071.666150][T30756] security_file_alloc+0x39/0x170 [ 1071.671282][T30756] __alloc_file+0xac/0x300 [ 1071.675696][T30756] alloc_empty_file+0x72/0x170 [ 1071.680539][T30756] path_openat+0xef/0x46e0 [ 1071.684946][T30756] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1071.690830][T30756] ? kasan_slab_alloc+0xf/0x20 [ 1071.695585][T30756] ? kmem_cache_alloc+0x11a/0x6f0 [ 1071.700630][T30756] ? getname_flags+0xd6/0x5b0 [ 1071.705293][T30756] ? getname+0x1a/0x20 [ 1071.709397][T30756] ? do_sys_open+0x2c9/0x5d0 [ 1071.713979][T30756] ? __x64_sys_open+0x7e/0xc0 [ 1071.718648][T30756] ? do_syscall_64+0x103/0x610 [ 1071.723492][T30756] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.729556][T30756] ? __lock_acquire+0x548/0x3fb0 [ 1071.734499][T30756] ? __lock_acquire+0x548/0x3fb0 [ 1071.739425][T30756] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1071.744800][T30756] ? __alloc_fd+0x430/0x530 [ 1071.749390][T30756] do_filp_open+0x1a1/0x280 [ 1071.753887][T30756] ? may_open_dev+0x100/0x100 [ 1071.758564][T30756] ? lock_downgrade+0x880/0x880 [ 1071.763408][T30756] ? kasan_check_read+0x11/0x20 [ 1071.768250][T30756] ? do_raw_spin_unlock+0x57/0x270 [ 1071.773363][T30756] ? _raw_spin_unlock+0x2d/0x50 [ 1071.778203][T30756] ? __alloc_fd+0x430/0x530 [ 1071.782708][T30756] do_sys_open+0x3fe/0x5d0 [ 1071.787115][T30756] ? filp_open+0x80/0x80 [ 1071.791380][T30756] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1071.796830][T30756] ? do_syscall_64+0x26/0x610 [ 1071.801931][T30756] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.808045][T30756] ? do_syscall_64+0x26/0x610 [ 1071.812717][T30756] __x64_sys_open+0x7e/0xc0 [ 1071.817389][T30756] do_syscall_64+0x103/0x610 [ 1071.821986][T30756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.827869][T30756] RIP: 0033:0x4121a1 [ 1071.831756][T30756] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1071.852232][T30756] RSP: 002b:00007feecb62ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1071.860911][T30756] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004121a1 [ 1071.868884][T30756] RDX: 00007feecb62eb0a RSI: 0000000000000002 RDI: 00007feecb62eb00 04:54:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1071.876855][T30756] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1071.884920][T30756] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1071.892886][T30756] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1071.900960][T30758] CPU: 1 PID: 30758 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1071.910174][T30758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.920505][T30758] Call Trace: [ 1071.923820][T30758] dump_stack+0x172/0x1f0 04:54:11 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000604000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}}]}, 0x2c}}, 0x0) 04:54:11 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1071.928180][T30758] should_fail.cold+0xa/0x15 [ 1071.932786][T30758] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1071.938626][T30758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1071.944208][T30758] __should_failslab+0x121/0x190 [ 1071.949333][T30758] should_failslab+0x9/0x14 [ 1071.953846][T30758] kmem_cache_alloc+0x47/0x6f0 [ 1071.958647][T30758] xas_alloc+0x2df/0x3d0 [ 1071.962881][T30758] xas_create+0x2cd/0xff0 [ 1071.967204][T30758] xas_create_range+0x198/0x5d0 [ 1071.972307][T30758] shmem_add_to_page_cache+0x6f3/0x1200 [ 1071.977897][T30758] ? shmem_writepage+0xe90/0xe90 [ 1071.982920][T30758] shmem_getpage_gfp+0x6db/0x2500 [ 1071.988025][T30758] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 1071.994255][T30758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1072.000482][T30758] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1072.006454][T30758] shmem_write_begin+0x105/0x1e0 [ 1072.011479][T30758] generic_perform_write+0x231/0x530 [ 1072.016849][T30758] ? page_endio+0x780/0x780 [ 1072.021337][T30758] ? current_time+0x140/0x140 [ 1072.026110][T30758] ? lock_acquire+0x1ea/0x3f0 [ 1072.030802][T30758] __generic_file_write_iter+0x25e/0x630 [ 1072.036611][T30758] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1072.042505][T30758] generic_file_write_iter+0x360/0x610 [ 1072.048133][T30758] ? __generic_file_write_iter+0x630/0x630 [ 1072.053937][T30758] ? aa_path_link+0x460/0x460 [ 1072.058696][T30758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1072.064937][T30758] ? iov_iter_init+0xee/0x220 [ 1072.069701][T30758] new_sync_write+0x4c7/0x760 [ 1072.074364][T30758] ? default_llseek+0x2e0/0x2e0 [ 1072.079197][T30758] ? lock_downgrade+0x880/0x880 [ 1072.084134][T30758] __vfs_write+0xe4/0x110 [ 1072.088453][T30758] vfs_write+0x20c/0x580 [ 1072.092857][T30758] ksys_pwrite64+0x183/0x1c0 [ 1072.097446][T30758] ? __ia32_sys_pread64+0xf0/0xf0 [ 1072.102466][T30758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1072.107908][T30758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1072.113350][T30758] ? do_syscall_64+0x26/0x610 [ 1072.119405][T30758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.133789][T30758] ? do_syscall_64+0x26/0x610 [ 1072.138567][T30758] __x64_sys_pwrite64+0x97/0xf0 [ 1072.143411][T30758] do_syscall_64+0x103/0x610 [ 1072.148120][T30758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.154018][T30758] RIP: 0033:0x412207 [ 1072.157901][T30758] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1072.177678][T30758] RSP: 002b:00007f8b673d6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1072.186160][T30758] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412207 [ 1072.194137][T30758] RDX: 00000000000000c8 RSI: 00000000200008c0 RDI: 0000000000000005 [ 1072.202090][T30758] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1072.210218][T30758] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 1072.218258][T30758] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000004 04:54:12 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5]}, 0x63) [ 1072.291142][T30765] FAULT_INJECTION: forcing a failure. [ 1072.291142][T30765] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.395689][T30765] CPU: 0 PID: 30765 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1072.404956][T30765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.415026][T30765] Call Trace: [ 1072.418349][T30765] dump_stack+0x172/0x1f0 [ 1072.422711][T30765] should_fail.cold+0xa/0x15 [ 1072.427336][T30765] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1072.433172][T30765] ? ___might_sleep+0x163/0x280 [ 1072.438195][T30765] __should_failslab+0x121/0x190 [ 1072.443171][T30765] should_failslab+0x9/0x14 [ 1072.447703][T30765] kmem_cache_alloc+0x2b2/0x6f0 [ 1072.452592][T30765] ? rcu_read_lock_sched_held+0x110/0x130 [ 1072.458359][T30765] ? kmem_cache_alloc+0x32e/0x6f0 [ 1072.463435][T30765] security_file_alloc+0x39/0x170 [ 1072.468611][T30765] __alloc_file+0xac/0x300 [ 1072.473063][T30765] alloc_empty_file+0x72/0x170 [ 1072.478111][T30765] path_openat+0xef/0x46e0 [ 1072.482567][T30765] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1072.488519][T30765] ? kasan_slab_alloc+0xf/0x20 [ 1072.493313][T30765] ? kmem_cache_alloc+0x11a/0x6f0 [ 1072.498794][T30765] ? getname_flags+0xd6/0x5b0 [ 1072.503479][T30765] ? getname+0x1a/0x20 [ 1072.508085][T30765] ? do_sys_open+0x2c9/0x5d0 [ 1072.512762][T30765] ? __x64_sys_open+0x7e/0xc0 [ 1072.517587][T30765] ? do_syscall_64+0x103/0x610 [ 1072.522569][T30765] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.528816][T30765] ? __lock_acquire+0x548/0x3fb0 [ 1072.533764][T30765] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1072.539176][T30765] ? __alloc_fd+0x430/0x530 [ 1072.543688][T30765] do_filp_open+0x1a1/0x280 [ 1072.548278][T30765] ? may_open_dev+0x100/0x100 [ 1072.552974][T30765] ? lock_downgrade+0x880/0x880 [ 1072.557829][T30765] ? kasan_check_read+0x11/0x20 [ 1072.562679][T30765] ? do_raw_spin_unlock+0x57/0x270 [ 1072.567820][T30765] ? _raw_spin_unlock+0x2d/0x50 [ 1072.572696][T30765] ? __alloc_fd+0x430/0x530 [ 1072.577218][T30765] do_sys_open+0x3fe/0x5d0 [ 1072.581657][T30765] ? filp_open+0x80/0x80 [ 1072.586002][T30765] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1072.592006][T30765] ? do_syscall_64+0x26/0x610 [ 1072.596775][T30765] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.602856][T30765] ? do_syscall_64+0x26/0x610 [ 1072.607546][T30765] __x64_sys_open+0x7e/0xc0 [ 1072.612065][T30765] do_syscall_64+0x103/0x610 [ 1072.616676][T30765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.622886][T30765] RIP: 0033:0x4121a1 [ 1072.626880][T30765] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 04:54:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105000000000000]}}]}, 0x2c}}, 0x0) 04:54:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:12 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1072.646879][T30765] RSP: 002b:00007feecb62ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1072.655467][T30765] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004121a1 [ 1072.664003][T30765] RDX: 00007feecb62eb0a RSI: 0000000000000002 RDI: 00007feecb62eb00 [ 1072.672270][T30765] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1072.680349][T30765] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1072.688423][T30765] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1072.812828][T30774] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}]}, 0x2c}}, 0x0) [ 1072.882561][T30790] FAULT_INJECTION: forcing a failure. [ 1072.882561][T30790] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.897418][T30790] CPU: 0 PID: 30790 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1072.906682][T30790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.917011][T30790] Call Trace: [ 1072.920406][T30790] dump_stack+0x172/0x1f0 [ 1072.924897][T30790] should_fail.cold+0xa/0x15 [ 1072.929594][T30790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1072.935770][T30790] ? ___might_sleep+0x163/0x280 [ 1072.941165][T30790] __should_failslab+0x121/0x190 [ 1072.948206][T30790] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1072.954530][T30790] should_failslab+0x9/0x14 [ 1072.959276][T30790] kmem_cache_alloc_trace+0x2d1/0x760 [ 1072.965270][T30790] ? lockdep_init_map+0x1be/0x6d0 [ 1072.970658][T30790] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1072.976511][T30790] __kthread_create_on_node+0xf2/0x460 [ 1072.982079][T30790] ? lock_acquire+0x16f/0x3f0 [ 1072.987234][T30790] ? kthread_parkme+0xb0/0xb0 [ 1072.994118][T30790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1073.000597][T30790] ? kasan_check_read+0x11/0x20 [ 1073.005494][T30790] ? mutex_trylock+0x1e0/0x1e0 [ 1073.010557][T30790] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1073.016313][T30790] kthread_create_on_node+0xbb/0xf0 [ 1073.021611][T30790] ? __kthread_create_on_node+0x460/0x460 [ 1073.027672][T30790] ? lockdep_init_map+0x1be/0x6d0 [ 1073.032709][T30790] ? lockdep_init_map+0x1be/0x6d0 [ 1073.038186][T30790] lo_ioctl+0xc1b/0x2150 [ 1073.042985][T30790] ? lo_rw_aio+0x1120/0x1120 [ 1073.048951][T30790] blkdev_ioctl+0xee8/0x1c40 [ 1073.053792][T30790] ? blkpg_ioctl+0xa90/0xa90 [ 1073.058917][T30790] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1073.065210][T30790] ? __fget+0x35a/0x550 [ 1073.069829][T30790] block_ioctl+0xee/0x130 [ 1073.074517][T30790] ? blkdev_fallocate+0x410/0x410 [ 1073.079551][T30790] do_vfs_ioctl+0xd6e/0x1390 [ 1073.084651][T30790] ? ioctl_preallocate+0x210/0x210 [ 1073.089865][T30790] ? __fget+0x381/0x550 [ 1073.094306][T30790] ? ksys_dup3+0x3e0/0x3e0 [ 1073.098747][T30790] ? do_sys_open+0x31d/0x5d0 [ 1073.103447][T30790] ? tomoyo_file_ioctl+0x23/0x30 [ 1073.108503][T30790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1073.115829][T30790] ? security_file_ioctl+0x93/0xc0 [ 1073.121227][T30790] ksys_ioctl+0xab/0xd0 [ 1073.126186][T30790] __x64_sys_ioctl+0x73/0xb0 [ 1073.130798][T30790] do_syscall_64+0x103/0x610 [ 1073.135408][T30790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.141326][T30790] RIP: 0033:0x458077 [ 1073.145221][T30790] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1073.165321][T30790] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1073.174143][T30790] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 04:54:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1073.182469][T30790] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1073.190914][T30790] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1073.201008][T30790] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1073.212552][T30790] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:13 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000684000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:13 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6]}, 0x63) 04:54:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}]}, 0x2c}}, 0x0) 04:54:13 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1073.502865][T30812] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1073.512225][T30818] FAULT_INJECTION: forcing a failure. [ 1073.512225][T30818] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.525371][T30818] CPU: 0 PID: 30818 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1073.534670][T30818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.544749][T30818] Call Trace: [ 1073.548154][T30818] dump_stack+0x172/0x1f0 04:54:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558000000000000]}}]}, 0x2c}}, 0x0) 04:54:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1073.552516][T30818] should_fail.cold+0xa/0x15 [ 1073.557126][T30818] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1073.563040][T30818] ? ___might_sleep+0x163/0x280 [ 1073.567927][T30818] __should_failslab+0x121/0x190 [ 1073.573349][T30818] should_failslab+0x9/0x14 [ 1073.578017][T30818] kmem_cache_alloc+0x2b2/0x6f0 [ 1073.582895][T30818] ? __schedule+0x1387/0x1cc0 [ 1073.587603][T30818] __kernfs_new_node+0xf0/0x6d0 [ 1073.592595][T30818] ? _raw_spin_unlock_irq+0x28/0x90 [ 1073.597824][T30818] ? kernfs_dop_revalidate+0x3c0/0x3c0 04:54:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1073.603318][T30818] ? kasan_check_read+0x11/0x20 [ 1073.608291][T30818] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1073.613549][T30818] ? __schedule+0x1387/0x1cc0 [ 1073.618609][T30818] ? __lock_acquire+0x548/0x3fb0 [ 1073.623671][T30818] kernfs_new_node+0x96/0x120 [ 1073.628494][T30818] kernfs_create_dir_ns+0x52/0x160 [ 1073.633620][T30818] internal_create_group+0x7f8/0xc40 [ 1073.639065][T30818] ? bd_set_size+0x89/0xb0 [ 1073.643601][T30818] ? remove_files.isra.0+0x190/0x190 [ 1073.648925][T30818] sysfs_create_group+0x20/0x30 [ 1073.653901][T30818] lo_ioctl+0x10af/0x2150 [ 1073.658260][T30818] ? lo_rw_aio+0x1120/0x1120 [ 1073.662886][T30818] blkdev_ioctl+0xee8/0x1c40 [ 1073.667503][T30818] ? blkpg_ioctl+0xa90/0xa90 [ 1073.672379][T30818] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1073.678216][T30818] ? __fget+0x35a/0x550 [ 1073.682405][T30818] block_ioctl+0xee/0x130 [ 1073.686856][T30818] ? blkdev_fallocate+0x410/0x410 [ 1073.692016][T30818] do_vfs_ioctl+0xd6e/0x1390 [ 1073.696635][T30818] ? ioctl_preallocate+0x210/0x210 04:54:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1073.701765][T30818] ? __fget+0x381/0x550 [ 1073.706128][T30818] ? ksys_dup3+0x3e0/0x3e0 [ 1073.710558][T30818] ? do_sys_open+0x31d/0x5d0 [ 1073.715363][T30818] ? tomoyo_file_ioctl+0x23/0x30 [ 1073.720325][T30818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1073.726578][T30818] ? security_file_ioctl+0x93/0xc0 [ 1073.731912][T30818] ksys_ioctl+0xab/0xd0 [ 1073.736246][T30818] __x64_sys_ioctl+0x73/0xb0 [ 1073.740880][T30818] do_syscall_64+0x103/0x610 [ 1073.745590][T30818] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:54:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1073.751679][T30818] RIP: 0033:0x458077 [ 1073.755585][T30818] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1073.775830][T30818] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1073.784460][T30818] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1073.793486][T30818] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1073.801482][T30818] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1073.809667][T30818] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1073.818357][T30818] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1073.965268][T30812] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}}]}, 0x2c}}, 0x0) 04:54:13 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000010000006c4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1074.286661][T30856] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:14 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7]}, 0x63) 04:54:14 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}}]}, 0x2c}}, 0x0) 04:54:14 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000744000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1074.342927][T30856] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1074.506423][T30874] FAULT_INJECTION: forcing a failure. [ 1074.506423][T30874] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.520470][T30874] CPU: 0 PID: 30874 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1074.529778][T30874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.540467][T30874] Call Trace: [ 1074.543787][T30874] dump_stack+0x172/0x1f0 [ 1074.548125][T30874] should_fail.cold+0xa/0x15 04:54:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000]}}]}, 0x2c}}, 0x0) 04:54:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1074.553032][T30874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1074.558884][T30874] ? __save_stack_trace+0x99/0x100 [ 1074.564124][T30874] __should_failslab+0x121/0x190 [ 1074.569103][T30874] should_failslab+0x9/0x14 [ 1074.573718][T30874] kmem_cache_alloc+0x47/0x6f0 [ 1074.579117][T30874] ? save_stack+0xa9/0xd0 [ 1074.583562][T30874] ? save_stack+0x45/0xd0 [ 1074.588168][T30874] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1074.594264][T30874] ? kasan_slab_alloc+0xf/0x20 [ 1074.599064][T30874] radix_tree_node_alloc.constprop.0+0x1eb/0x340 04:54:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1074.605865][T30874] idr_get_free+0x425/0x8d0 [ 1074.610596][T30874] idr_alloc_u32+0x19e/0x330 [ 1074.616006][T30874] ? __fprop_inc_percpu_max+0x230/0x230 [ 1074.621754][T30874] ? mark_held_locks+0xf0/0xf0 [ 1074.626627][T30874] idr_alloc_cyclic+0x132/0x270 [ 1074.631940][T30874] ? idr_alloc+0x150/0x150 [ 1074.636378][T30874] __kernfs_new_node+0x172/0x6d0 [ 1074.641728][T30874] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1074.647298][T30874] ? __lock_acquire+0x548/0x3fb0 [ 1074.653125][T30874] kernfs_new_node+0x96/0x120 [ 1074.657988][T30874] kernfs_create_dir_ns+0x52/0x160 [ 1074.663132][T30874] internal_create_group+0x7f8/0xc40 [ 1074.668524][T30874] ? bd_set_size+0x89/0xb0 [ 1074.673060][T30874] ? remove_files.isra.0+0x190/0x190 [ 1074.678445][T30874] sysfs_create_group+0x20/0x30 [ 1074.683304][T30874] lo_ioctl+0x10af/0x2150 [ 1074.687655][T30874] ? lo_rw_aio+0x1120/0x1120 [ 1074.692377][T30874] blkdev_ioctl+0xee8/0x1c40 [ 1074.696993][T30874] ? blkpg_ioctl+0xa90/0xa90 [ 1074.701852][T30874] ? tomoyo_execute_permission+0x4a0/0x4a0 04:54:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1074.707689][T30874] ? __fget+0x35a/0x550 [ 1074.711960][T30874] block_ioctl+0xee/0x130 [ 1074.716306][T30874] ? blkdev_fallocate+0x410/0x410 [ 1074.721441][T30874] do_vfs_ioctl+0xd6e/0x1390 [ 1074.726238][T30874] ? ioctl_preallocate+0x210/0x210 [ 1074.731457][T30874] ? __fget+0x381/0x550 [ 1074.735638][T30874] ? ksys_dup3+0x3e0/0x3e0 [ 1074.740197][T30874] ? do_sys_open+0x31d/0x5d0 [ 1074.744830][T30874] ? tomoyo_file_ioctl+0x23/0x30 [ 1074.749925][T30874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1074.756197][T30874] ? security_file_ioctl+0x93/0xc0 [ 1074.761389][T30874] ksys_ioctl+0xab/0xd0 [ 1074.765742][T30874] __x64_sys_ioctl+0x73/0xb0 [ 1074.770378][T30874] do_syscall_64+0x103/0x610 [ 1074.774999][T30874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.781195][T30874] RIP: 0033:0x458077 [ 1074.785197][T30874] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:54:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1074.805300][T30874] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1074.814038][T30874] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1074.822222][T30874] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1074.830602][T30874] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1074.838681][T30874] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1074.846762][T30874] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1074.896893][T30878] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:14 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1075.058916][T30878] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1075.095507][T30902] FAULT_INJECTION: forcing a failure. [ 1075.095507][T30902] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.117102][T30902] CPU: 0 PID: 30902 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1075.133855][T30902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.144092][T30902] Call Trace: [ 1075.147396][T30902] dump_stack+0x172/0x1f0 [ 1075.151740][T30902] should_fail.cold+0xa/0x15 [ 1075.156574][T30902] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1075.162401][T30902] ? ___might_sleep+0x163/0x280 [ 1075.167259][T30902] __should_failslab+0x121/0x190 [ 1075.172305][T30902] should_failslab+0x9/0x14 [ 1075.176840][T30902] kmem_cache_alloc+0x2b2/0x6f0 [ 1075.181699][T30902] ? lock_downgrade+0x880/0x880 [ 1075.186547][T30902] ? kasan_check_read+0x11/0x20 [ 1075.191425][T30902] __kernfs_new_node+0xf0/0x6d0 [ 1075.196282][T30902] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1075.201874][T30902] ? wait_for_completion+0x440/0x440 [ 1075.207280][T30902] ? mutex_unlock+0xd/0x10 [ 1075.211829][T30902] ? kernfs_activate+0x192/0x1f0 [ 1075.217083][T30902] kernfs_new_node+0x96/0x120 [ 1075.221960][T30902] __kernfs_create_file+0x51/0x340 [ 1075.227083][T30902] sysfs_add_file_mode_ns+0x222/0x560 [ 1075.232652][T30902] internal_create_group+0x35b/0xc40 [ 1075.243056][T30902] ? bd_set_size+0x89/0xb0 [ 1075.247587][T30902] ? remove_files.isra.0+0x190/0x190 [ 1075.252899][T30902] sysfs_create_group+0x20/0x30 [ 1075.257787][T30902] lo_ioctl+0x10af/0x2150 [ 1075.262132][T30902] ? lo_rw_aio+0x1120/0x1120 [ 1075.266935][T30902] blkdev_ioctl+0xee8/0x1c40 [ 1075.271547][T30902] ? blkpg_ioctl+0xa90/0xa90 [ 1075.276152][T30902] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1075.282136][T30902] ? __fget+0x35a/0x550 [ 1075.286518][T30902] block_ioctl+0xee/0x130 [ 1075.290852][T30902] ? blkdev_fallocate+0x410/0x410 [ 1075.296329][T30902] do_vfs_ioctl+0xd6e/0x1390 [ 1075.300961][T30902] ? ioctl_preallocate+0x210/0x210 [ 1075.306071][T30902] ? __fget+0x381/0x550 [ 1075.310237][T30902] ? ksys_dup3+0x3e0/0x3e0 [ 1075.314940][T30902] ? do_sys_open+0x31d/0x5d0 [ 1075.319555][T30902] ? tomoyo_file_ioctl+0x23/0x30 [ 1075.324713][T30902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1075.331073][T30902] ? security_file_ioctl+0x93/0xc0 [ 1075.336204][T30902] ksys_ioctl+0xab/0xd0 [ 1075.340458][T30902] __x64_sys_ioctl+0x73/0xb0 [ 1075.345057][T30902] do_syscall_64+0x103/0x610 [ 1075.349879][T30902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.355898][T30902] RIP: 0033:0x458077 04:54:15 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8]}, 0x63) 04:54:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}}]}, 0x2c}}, 0x0) 04:54:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1075.359809][T30902] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.379603][T30902] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1075.388037][T30902] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1075.396031][T30902] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1075.404241][T30902] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1075.412409][T30902] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1075.420485][T30902] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:15 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000010000007a4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}, 0x2c}}, 0x0) 04:54:15 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1075.674463][T30931] FAULT_INJECTION: forcing a failure. [ 1075.674463][T30931] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.703227][T30931] CPU: 0 PID: 30931 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1075.712550][T30931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 04:54:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1075.722718][T30931] Call Trace: [ 1075.726032][T30931] dump_stack+0x172/0x1f0 [ 1075.730475][T30931] should_fail.cold+0xa/0x15 [ 1075.735086][T30931] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1075.740922][T30931] ? ___might_sleep+0x163/0x280 [ 1075.745962][T30931] __should_failslab+0x121/0x190 [ 1075.750922][T30931] should_failslab+0x9/0x14 [ 1075.755594][T30931] kmem_cache_alloc+0x2b2/0x6f0 [ 1075.760549][T30931] ? lock_downgrade+0x880/0x880 [ 1075.765425][T30931] ? kasan_check_read+0x11/0x20 04:54:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}]}, 0x2c}}, 0x0) [ 1075.770338][T30931] __kernfs_new_node+0xf0/0x6d0 [ 1075.775223][T30931] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1075.780747][T30931] ? wait_for_completion+0x440/0x440 [ 1075.786276][T30931] ? mutex_unlock+0xd/0x10 [ 1075.790978][T30931] ? kernfs_activate+0x192/0x1f0 [ 1075.795937][T30931] kernfs_new_node+0x96/0x120 [ 1075.800637][T30931] __kernfs_create_file+0x51/0x340 [ 1075.805764][T30931] sysfs_add_file_mode_ns+0x222/0x560 [ 1075.811151][T30931] internal_create_group+0x35b/0xc40 [ 1075.816586][T30931] ? bd_set_size+0x89/0xb0 04:54:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1075.821040][T30931] ? remove_files.isra.0+0x190/0x190 [ 1075.826448][T30931] sysfs_create_group+0x20/0x30 [ 1075.831300][T30931] lo_ioctl+0x10af/0x2150 [ 1075.835750][T30931] ? lo_rw_aio+0x1120/0x1120 [ 1075.840442][T30931] blkdev_ioctl+0xee8/0x1c40 [ 1075.845087][T30931] ? blkpg_ioctl+0xa90/0xa90 [ 1075.849711][T30931] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1075.855550][T30931] ? __fget+0x35a/0x550 [ 1075.859731][T30931] block_ioctl+0xee/0x130 [ 1075.864082][T30931] ? blkdev_fallocate+0x410/0x410 [ 1075.870136][T30931] do_vfs_ioctl+0xd6e/0x1390 [ 1075.874748][T30931] ? ioctl_preallocate+0x210/0x210 [ 1075.880171][T30931] ? __fget+0x381/0x550 [ 1075.884355][T30931] ? ksys_dup3+0x3e0/0x3e0 [ 1075.888934][T30931] ? do_sys_open+0x31d/0x5d0 [ 1075.894565][T30931] ? tomoyo_file_ioctl+0x23/0x30 [ 1075.899511][T30931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1075.905762][T30931] ? security_file_ioctl+0x93/0xc0 [ 1075.910978][T30931] ksys_ioctl+0xab/0xd0 [ 1075.915166][T30931] __x64_sys_ioctl+0x73/0xb0 [ 1075.919862][T30931] do_syscall_64+0x103/0x610 [ 1075.924655][T30931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.930560][T30931] RIP: 0033:0x458077 [ 1075.934557][T30931] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.954274][T30931] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1075.962798][T30931] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1075.970884][T30931] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1075.979136][T30931] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1075.987468][T30931] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1075.995534][T30931] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1076.064383][T30934] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:16 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x9]}, 0x63) 04:54:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}]}, 0x2c}}, 0x0) 04:54:16 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:16 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001ffffff8c4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1076.503138][T30965] FAULT_INJECTION: forcing a failure. [ 1076.503138][T30965] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.535966][T30965] CPU: 1 PID: 30965 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1076.545148][T30965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.555426][T30965] Call Trace: [ 1076.558735][T30965] dump_stack+0x172/0x1f0 [ 1076.563213][T30965] should_fail.cold+0xa/0x15 [ 1076.567825][T30965] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1076.574115][T30965] ? ___might_sleep+0x163/0x280 [ 1076.579074][T30965] __should_failslab+0x121/0x190 [ 1076.584015][T30965] should_failslab+0x9/0x14 [ 1076.588599][T30965] kmem_cache_alloc+0x2b2/0x6f0 [ 1076.593551][T30965] ? lock_downgrade+0x880/0x880 [ 1076.598405][T30965] ? kasan_check_read+0x11/0x20 [ 1076.603349][T30965] __kernfs_new_node+0xf0/0x6d0 [ 1076.608287][T30965] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1076.613764][T30965] ? wait_for_completion+0x440/0x440 [ 1076.619412][T30965] ? mutex_unlock+0xd/0x10 [ 1076.624282][T30965] ? kernfs_activate+0x192/0x1f0 [ 1076.629216][T30965] kernfs_new_node+0x96/0x120 [ 1076.633907][T30965] __kernfs_create_file+0x51/0x340 [ 1076.639138][T30965] sysfs_add_file_mode_ns+0x222/0x560 [ 1076.644523][T30965] internal_create_group+0x35b/0xc40 [ 1076.650071][T30965] ? bd_set_size+0x89/0xb0 [ 1076.654501][T30965] ? remove_files.isra.0+0x190/0x190 [ 1076.659804][T30965] sysfs_create_group+0x20/0x30 [ 1076.664654][T30965] lo_ioctl+0x10af/0x2150 [ 1076.669061][T30965] ? lo_rw_aio+0x1120/0x1120 [ 1076.673748][T30965] blkdev_ioctl+0xee8/0x1c40 [ 1076.678427][T30965] ? blkpg_ioctl+0xa90/0xa90 [ 1076.683115][T30965] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1076.688945][T30965] ? __fget+0x35a/0x550 [ 1076.693196][T30965] block_ioctl+0xee/0x130 [ 1076.697718][T30965] ? blkdev_fallocate+0x410/0x410 [ 1076.702857][T30965] do_vfs_ioctl+0xd6e/0x1390 [ 1076.707558][T30965] ? ioctl_preallocate+0x210/0x210 [ 1076.712937][T30965] ? __fget+0x381/0x550 [ 1076.717106][T30965] ? ksys_dup3+0x3e0/0x3e0 [ 1076.721520][T30965] ? do_sys_open+0x31d/0x5d0 [ 1076.729155][T30965] ? tomoyo_file_ioctl+0x23/0x30 [ 1076.734114][T30965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1076.740378][T30965] ? security_file_ioctl+0x93/0xc0 [ 1076.745507][T30965] ksys_ioctl+0xab/0xd0 [ 1076.749700][T30965] __x64_sys_ioctl+0x73/0xb0 [ 1076.754530][T30965] do_syscall_64+0x103/0x610 [ 1076.759116][T30965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1076.765121][T30965] RIP: 0033:0x458077 [ 1076.769010][T30965] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1076.789110][T30965] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:54:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}]}, 0x2c}}, 0x0) 04:54:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1076.797549][T30965] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1076.805796][T30965] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1076.813882][T30965] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1076.822000][T30965] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1076.830244][T30965] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1076.886846][T30967] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}]}, 0x2c}}, 0x0) 04:54:16 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1076.997743][T30967] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:16 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000010000edc04000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1077.208760][T30999] FAULT_INJECTION: forcing a failure. [ 1077.208760][T30999] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.228067][T30999] CPU: 1 PID: 30999 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1077.237891][T30999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.248525][T30999] Call Trace: [ 1077.252181][T30999] dump_stack+0x172/0x1f0 [ 1077.256902][T30999] should_fail.cold+0xa/0x15 [ 1077.261529][T30999] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1077.267530][T30999] ? ___might_sleep+0x163/0x280 [ 1077.272864][T30999] __should_failslab+0x121/0x190 [ 1077.277981][T30999] should_failslab+0x9/0x14 [ 1077.282508][T30999] kmem_cache_alloc+0x2b2/0x6f0 [ 1077.287625][T30999] ? lock_downgrade+0x880/0x880 [ 1077.292579][T30999] ? kasan_check_read+0x11/0x20 [ 1077.297505][T30999] __kernfs_new_node+0xf0/0x6d0 [ 1077.302518][T30999] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1077.308011][T30999] ? wait_for_completion+0x440/0x440 [ 1077.313319][T30999] ? mutex_unlock+0xd/0x10 [ 1077.317924][T30999] ? kernfs_activate+0x192/0x1f0 [ 1077.322868][T30999] kernfs_new_node+0x96/0x120 [ 1077.327668][T30999] __kernfs_create_file+0x51/0x340 [ 1077.333157][T30999] sysfs_add_file_mode_ns+0x222/0x560 [ 1077.338769][T30999] internal_create_group+0x35b/0xc40 [ 1077.344071][T30999] ? bd_set_size+0x89/0xb0 [ 1077.349117][T30999] ? remove_files.isra.0+0x190/0x190 [ 1077.354453][T30999] sysfs_create_group+0x20/0x30 04:54:17 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa]}, 0x63) 04:54:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}]}, 0x2c}}, 0x0) 04:54:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1077.359318][T30999] lo_ioctl+0x10af/0x2150 [ 1077.363775][T30999] ? lo_rw_aio+0x1120/0x1120 [ 1077.368575][T30999] blkdev_ioctl+0xee8/0x1c40 [ 1077.373191][T30999] ? blkpg_ioctl+0xa90/0xa90 [ 1077.377876][T30999] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1077.383809][T30999] ? __fget+0x35a/0x550 [ 1077.388013][T30999] block_ioctl+0xee/0x130 [ 1077.392473][T30999] ? blkdev_fallocate+0x410/0x410 [ 1077.397517][T30999] do_vfs_ioctl+0xd6e/0x1390 [ 1077.402406][T30999] ? ioctl_preallocate+0x210/0x210 [ 1077.408304][T30999] ? __fget+0x381/0x550 [ 1077.414323][T30999] ? ksys_dup3+0x3e0/0x3e0 [ 1077.418789][T30999] ? do_sys_open+0x31d/0x5d0 [ 1077.423408][T30999] ? tomoyo_file_ioctl+0x23/0x30 [ 1077.429767][T30999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1077.436065][T30999] ? security_file_ioctl+0x93/0xc0 [ 1077.441188][T30999] ksys_ioctl+0xab/0xd0 [ 1077.448046][T30999] __x64_sys_ioctl+0x73/0xb0 [ 1077.452680][T30999] do_syscall_64+0x103/0x610 [ 1077.457302][T30999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.463344][T30999] RIP: 0033:0x458077 [ 1077.467774][T30999] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1077.488083][T30999] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.497077][T30999] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 04:54:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1077.505295][T30999] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1077.514286][T30999] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1077.522866][T30999] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1077.532203][T30999] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1077.583098][T31002] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:17 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}]}, 0x2c}}, 0x0) 04:54:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1077.748248][T31002] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:17 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fffffff44000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1077.858289][T31028] FAULT_INJECTION: forcing a failure. [ 1077.858289][T31028] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.874728][T31028] CPU: 0 PID: 31028 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1077.883883][T31028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.894234][T31028] Call Trace: [ 1077.897554][T31028] dump_stack+0x172/0x1f0 [ 1077.902111][T31028] should_fail.cold+0xa/0x15 [ 1077.906741][T31028] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1077.912584][T31028] ? ___might_sleep+0x163/0x280 [ 1077.917480][T31028] __should_failslab+0x121/0x190 [ 1077.922454][T31028] should_failslab+0x9/0x14 [ 1077.927092][T31028] kmem_cache_alloc+0x2b2/0x6f0 [ 1077.932102][T31028] ? lock_downgrade+0x880/0x880 [ 1077.936971][T31028] ? kasan_check_read+0x11/0x20 [ 1077.941846][T31028] __kernfs_new_node+0xf0/0x6d0 [ 1077.946747][T31028] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1077.952230][T31028] ? wait_for_completion+0x440/0x440 04:54:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1077.957569][T31028] ? mutex_unlock+0xd/0x10 [ 1077.962108][T31028] ? kernfs_activate+0x192/0x1f0 [ 1077.967090][T31028] kernfs_new_node+0x96/0x120 [ 1077.971817][T31028] __kernfs_create_file+0x51/0x340 [ 1077.978129][T31028] sysfs_add_file_mode_ns+0x222/0x560 [ 1077.983844][T31028] internal_create_group+0x35b/0xc40 [ 1077.989598][T31028] ? bd_set_size+0x89/0xb0 [ 1077.994462][T31028] ? remove_files.isra.0+0x190/0x190 [ 1078.000224][T31028] sysfs_create_group+0x20/0x30 [ 1078.021056][T31028] lo_ioctl+0x10af/0x2150 [ 1078.041227][T31028] ? lo_rw_aio+0x1120/0x1120 [ 1078.046283][T31028] blkdev_ioctl+0xee8/0x1c40 [ 1078.050902][T31028] ? blkpg_ioctl+0xa90/0xa90 [ 1078.055522][T31028] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1078.061584][T31028] ? __fget+0x35a/0x550 04:54:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1078.065863][T31028] block_ioctl+0xee/0x130 [ 1078.071706][T31028] ? blkdev_fallocate+0x410/0x410 [ 1078.078545][T31028] do_vfs_ioctl+0xd6e/0x1390 [ 1078.083417][T31028] ? ioctl_preallocate+0x210/0x210 [ 1078.088944][T31028] ? __fget+0x381/0x550 [ 1078.093798][T31028] ? ksys_dup3+0x3e0/0x3e0 [ 1078.098625][T31028] ? do_sys_open+0x31d/0x5d0 [ 1078.103402][T31028] ? tomoyo_file_ioctl+0x23/0x30 [ 1078.109169][T31028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1078.115597][T31028] ? security_file_ioctl+0x93/0xc0 [ 1078.121204][T31028] ksys_ioctl+0xab/0xd0 [ 1078.126002][T31028] __x64_sys_ioctl+0x73/0xb0 [ 1078.131947][T31028] do_syscall_64+0x103/0x610 [ 1078.138662][T31028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.148820][T31028] RIP: 0033:0x458077 04:54:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1078.152964][T31028] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.173402][T31028] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1078.183039][T31028] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1078.194512][T31028] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1078.202583][T31028] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 04:54:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}]}, 0x2c}}, 0x0) [ 1078.210661][T31028] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1078.218658][T31028] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1078.505203][T31054] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:18 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xb]}, 0x63) 04:54:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}]}, 0x2c}}, 0x0) 04:54:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:18 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1078.585407][T31054] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:18 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fffffff54000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1078.688325][T31069] FAULT_INJECTION: forcing a failure. [ 1078.688325][T31069] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.719888][T31069] CPU: 1 PID: 31069 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 04:54:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}]}, 0x2c}}, 0x0) [ 1078.729394][T31069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.739471][T31069] Call Trace: [ 1078.742920][T31069] dump_stack+0x172/0x1f0 [ 1078.747337][T31069] should_fail.cold+0xa/0x15 [ 1078.752231][T31069] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1078.758260][T31069] ? ___might_sleep+0x163/0x280 [ 1078.763205][T31069] __should_failslab+0x121/0x190 [ 1078.769430][T31069] should_failslab+0x9/0x14 [ 1078.774457][T31069] kmem_cache_alloc+0x2b2/0x6f0 [ 1078.779300][T31069] ? lock_downgrade+0x880/0x880 [ 1078.784420][T31069] ? kasan_check_read+0x11/0x20 [ 1078.789358][T31069] __kernfs_new_node+0xf0/0x6d0 [ 1078.794402][T31069] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1078.799930][T31069] ? wait_for_completion+0x440/0x440 [ 1078.805301][T31069] ? mutex_unlock+0xd/0x10 [ 1078.809708][T31069] ? kernfs_activate+0x192/0x1f0 [ 1078.814640][T31069] kernfs_new_node+0x96/0x120 [ 1078.819327][T31069] __kernfs_create_file+0x51/0x340 [ 1078.824440][T31069] sysfs_add_file_mode_ns+0x222/0x560 [ 1078.829814][T31069] internal_create_group+0x35b/0xc40 [ 1078.835095][T31069] ? bd_set_size+0x89/0xb0 [ 1078.839601][T31069] ? remove_files.isra.0+0x190/0x190 [ 1078.844974][T31069] sysfs_create_group+0x20/0x30 [ 1078.849998][T31069] lo_ioctl+0x10af/0x2150 [ 1078.854456][T31069] ? lo_rw_aio+0x1120/0x1120 [ 1078.859047][T31069] blkdev_ioctl+0xee8/0x1c40 [ 1078.863646][T31069] ? blkpg_ioctl+0xa90/0xa90 [ 1078.868614][T31069] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1078.874464][T31069] ? __fget+0x35a/0x550 [ 1078.878642][T31069] block_ioctl+0xee/0x130 [ 1078.882982][T31069] ? blkdev_fallocate+0x410/0x410 [ 1078.888209][T31069] do_vfs_ioctl+0xd6e/0x1390 [ 1078.893554][T31069] ? ioctl_preallocate+0x210/0x210 [ 1078.898759][T31069] ? __fget+0x381/0x550 [ 1078.902943][T31069] ? ksys_dup3+0x3e0/0x3e0 [ 1078.907360][T31069] ? do_sys_open+0x31d/0x5d0 [ 1078.912035][T31069] ? tomoyo_file_ioctl+0x23/0x30 [ 1078.916992][T31069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1078.923532][T31069] ? security_file_ioctl+0x93/0xc0 [ 1078.929020][T31069] ksys_ioctl+0xab/0xd0 [ 1078.933183][T31069] __x64_sys_ioctl+0x73/0xb0 [ 1078.937938][T31069] do_syscall_64+0x103/0x610 [ 1078.942623][T31069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.948503][T31069] RIP: 0033:0x458077 [ 1078.952390][T31069] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.972292][T31069] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1078.980795][T31069] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1078.989459][T31069] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1078.997528][T31069] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1079.005495][T31069] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1079.013680][T31069] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}]}, 0x2c}}, 0x0) 04:54:19 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1079.240363][T31086] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}]}, 0x2c}}, 0x0) [ 1079.384014][T31103] FAULT_INJECTION: forcing a failure. [ 1079.384014][T31103] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.398485][T31103] CPU: 0 PID: 31103 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1079.408767][T31103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.419204][T31103] Call Trace: [ 1079.422681][T31103] dump_stack+0x172/0x1f0 [ 1079.427199][T31103] should_fail.cold+0xa/0x15 [ 1079.432378][T31103] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1079.438701][T31103] ? ___might_sleep+0x163/0x280 [ 1079.443860][T31103] __should_failslab+0x121/0x190 [ 1079.448932][T31103] should_failslab+0x9/0x14 [ 1079.453800][T31103] __kmalloc+0x2dc/0x740 [ 1079.458206][T31103] ? kobject_uevent_env+0x2fb/0x1030 [ 1079.463527][T31103] ? rcu_read_lock_sched_held+0x110/0x130 [ 1079.470275][T31103] ? kobject_get_path+0xc4/0x1b0 [ 1079.475246][T31103] kobject_get_path+0xc4/0x1b0 [ 1079.480345][T31103] kobject_uevent_env+0x31f/0x1030 [ 1079.485659][T31103] kobject_uevent+0x20/0x26 [ 1079.490895][T31103] lo_ioctl+0x112b/0x2150 [ 1079.495269][T31103] ? lo_rw_aio+0x1120/0x1120 [ 1079.500611][T31103] blkdev_ioctl+0xee8/0x1c40 [ 1079.506696][T31103] ? blkpg_ioctl+0xa90/0xa90 [ 1079.511484][T31103] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1079.518389][T31103] ? __fget+0x35a/0x550 [ 1079.523176][T31103] block_ioctl+0xee/0x130 [ 1079.528118][T31103] ? blkdev_fallocate+0x410/0x410 [ 1079.533782][T31103] do_vfs_ioctl+0xd6e/0x1390 [ 1079.538482][T31103] ? ioctl_preallocate+0x210/0x210 [ 1079.543704][T31103] ? __fget+0x381/0x550 [ 1079.548374][T31103] ? ksys_dup3+0x3e0/0x3e0 [ 1079.553025][T31103] ? do_sys_open+0x31d/0x5d0 [ 1079.557635][T31103] ? tomoyo_file_ioctl+0x23/0x30 [ 1079.562582][T31103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1079.569009][T31103] ? security_file_ioctl+0x93/0xc0 [ 1079.574407][T31103] ksys_ioctl+0xab/0xd0 [ 1079.578760][T31103] __x64_sys_ioctl+0x73/0xb0 [ 1079.584144][T31103] do_syscall_64+0x103/0x610 [ 1079.589028][T31103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1079.595047][T31103] RIP: 0033:0x458077 [ 1079.599040][T31103] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1079.619917][T31103] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1079.628736][T31103] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1079.637307][T31103] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1079.646001][T31103] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1079.654996][T31103] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1079.663319][T31103] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1079.677866][T31086] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:19 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc]}, 0x63) 04:54:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:19 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fffffff64000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}]}, 0x2c}}, 0x0) 04:54:19 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1079.993839][T31122] FAULT_INJECTION: forcing a failure. [ 1079.993839][T31122] name failslab, interval 1, probability 0, space 0, times 0 [ 1080.017605][T31122] CPU: 1 PID: 31122 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1080.027313][T31122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.038328][T31122] Call Trace: 04:54:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}]}, 0x2c}}, 0x0) [ 1080.042564][T31122] dump_stack+0x172/0x1f0 [ 1080.047112][T31122] should_fail.cold+0xa/0x15 [ 1080.052259][T31122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1080.058872][T31122] ? ___might_sleep+0x163/0x280 [ 1080.064189][T31122] __should_failslab+0x121/0x190 [ 1080.071627][T31122] should_failslab+0x9/0x14 [ 1080.076466][T31122] __kmalloc+0x2dc/0x740 [ 1080.082398][T31122] ? kobject_uevent_env+0x2fb/0x1030 [ 1080.089273][T31122] ? rcu_read_lock_sched_held+0x110/0x130 [ 1080.095720][T31122] ? kobject_get_path+0xc4/0x1b0 [ 1080.101456][T31122] kobject_get_path+0xc4/0x1b0 [ 1080.106867][T31122] kobject_uevent_env+0x31f/0x1030 [ 1080.112476][T31122] kobject_uevent+0x20/0x26 [ 1080.117653][T31122] lo_ioctl+0x112b/0x2150 [ 1080.122518][T31122] ? lo_rw_aio+0x1120/0x1120 [ 1080.127390][T31122] blkdev_ioctl+0xee8/0x1c40 [ 1080.133157][T31122] ? blkpg_ioctl+0xa90/0xa90 [ 1080.138881][T31122] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1080.146263][T31122] ? __fget+0x35a/0x550 [ 1080.150634][T31122] block_ioctl+0xee/0x130 [ 1080.155673][T31122] ? blkdev_fallocate+0x410/0x410 [ 1080.161520][T31122] do_vfs_ioctl+0xd6e/0x1390 [ 1080.166336][T31122] ? ioctl_preallocate+0x210/0x210 [ 1080.172038][T31122] ? __fget+0x381/0x550 [ 1080.176408][T31122] ? ksys_dup3+0x3e0/0x3e0 [ 1080.181469][T31122] ? do_sys_open+0x31d/0x5d0 [ 1080.186974][T31122] ? tomoyo_file_ioctl+0x23/0x30 [ 1080.192355][T31122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1080.199942][T31122] ? security_file_ioctl+0x93/0xc0 [ 1080.205193][T31122] ksys_ioctl+0xab/0xd0 [ 1080.209596][T31122] __x64_sys_ioctl+0x73/0xb0 [ 1080.215934][T31122] do_syscall_64+0x103/0x610 [ 1080.221026][T31122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1080.227716][T31122] RIP: 0033:0x458077 [ 1080.232383][T31122] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1080.253862][T31122] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1080.263015][T31122] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1080.272297][T31122] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1080.281007][T31122] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 04:54:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1080.289573][T31122] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1080.298520][T31122] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1080.345010][T31128] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:20 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}}]}, 0x2c}}, 0x0) 04:54:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1080.531210][T31128] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1080.641079][T31157] FAULT_INJECTION: forcing a failure. [ 1080.641079][T31157] name failslab, interval 1, probability 0, space 0, times 0 [ 1080.674560][T31157] CPU: 0 PID: 31157 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1080.684884][T31157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.696638][T31157] Call Trace: [ 1080.700253][T31157] dump_stack+0x172/0x1f0 [ 1080.704989][T31157] should_fail.cold+0xa/0x15 [ 1080.710074][T31157] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1080.716533][T31157] ? ___might_sleep+0x163/0x280 [ 1080.721586][T31157] __should_failslab+0x121/0x190 [ 1080.727357][T31157] should_failslab+0x9/0x14 [ 1080.732229][T31157] kmem_cache_alloc_node_trace+0x270/0x720 [ 1080.738178][T31157] __kmalloc_node_track_caller+0x3d/0x70 [ 1080.744636][T31157] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1080.750737][T31157] __alloc_skb+0x10b/0x5e0 [ 1080.755576][T31157] ? skb_trim+0x190/0x190 [ 1080.760614][T31157] ? kasan_check_read+0x11/0x20 [ 1080.765701][T31157] alloc_uevent_skb+0x83/0x1e2 [ 1080.770966][T31157] kobject_uevent_env+0xa63/0x1030 [ 1080.777366][T31157] kobject_uevent+0x20/0x26 [ 1080.782554][T31157] lo_ioctl+0x112b/0x2150 [ 1080.787355][T31157] ? lo_rw_aio+0x1120/0x1120 [ 1080.792381][T31157] blkdev_ioctl+0xee8/0x1c40 [ 1080.797622][T31157] ? blkpg_ioctl+0xa90/0xa90 [ 1080.802445][T31157] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1080.808610][T31157] ? __fget+0x35a/0x550 [ 1080.813063][T31157] block_ioctl+0xee/0x130 [ 1080.817681][T31157] ? blkdev_fallocate+0x410/0x410 [ 1080.823252][T31157] do_vfs_ioctl+0xd6e/0x1390 [ 1080.829094][T31157] ? ioctl_preallocate+0x210/0x210 [ 1080.834922][T31157] ? __fget+0x381/0x550 [ 1080.839445][T31157] ? ksys_dup3+0x3e0/0x3e0 [ 1080.844475][T31157] ? do_sys_open+0x31d/0x5d0 [ 1080.850290][T31157] ? tomoyo_file_ioctl+0x23/0x30 [ 1080.856089][T31157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1080.862804][T31157] ? security_file_ioctl+0x93/0xc0 [ 1080.868418][T31157] ksys_ioctl+0xab/0xd0 [ 1080.872829][T31157] __x64_sys_ioctl+0x73/0xb0 [ 1080.877593][T31157] do_syscall_64+0x103/0x610 [ 1080.882382][T31157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1080.888606][T31157] RIP: 0033:0x458077 [ 1080.892908][T31157] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1080.913331][T31157] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1080.922726][T31157] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1080.931298][T31157] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1080.939815][T31157] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1080.948595][T31157] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1080.956660][T31157] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:20 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xd]}, 0x63) 04:54:20 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fffffdf94000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}]}, 0x2c}}, 0x0) 04:54:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:20 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1081.302250][T31177] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1081.319658][T31189] FAULT_INJECTION: forcing a failure. [ 1081.319658][T31189] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.348572][T31189] CPU: 0 PID: 31189 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1081.358509][T31189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.369310][T31189] Call Trace: [ 1081.373028][T31189] dump_stack+0x172/0x1f0 [ 1081.377705][T31189] should_fail.cold+0xa/0x15 [ 1081.384417][T31189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1081.390899][T31189] ? ___might_sleep+0x163/0x280 [ 1081.395911][T31189] __should_failslab+0x121/0x190 04:54:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1081.401345][T31189] should_failslab+0x9/0x14 [ 1081.405963][T31189] kmem_cache_alloc_node_trace+0x270/0x720 [ 1081.412401][T31189] __kmalloc_node_track_caller+0x3d/0x70 [ 1081.418916][T31189] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1081.424772][T31189] __alloc_skb+0x10b/0x5e0 [ 1081.429623][T31189] ? skb_trim+0x190/0x190 [ 1081.434684][T31189] ? kasan_check_read+0x11/0x20 [ 1081.439840][T31189] alloc_uevent_skb+0x83/0x1e2 [ 1081.445412][T31189] kobject_uevent_env+0xa63/0x1030 04:54:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1081.451042][T31189] kobject_uevent+0x20/0x26 [ 1081.455920][T31189] lo_ioctl+0x112b/0x2150 [ 1081.460744][T31189] ? lo_rw_aio+0x1120/0x1120 [ 1081.465532][T31189] blkdev_ioctl+0xee8/0x1c40 [ 1081.470381][T31189] ? blkpg_ioctl+0xa90/0xa90 [ 1081.474997][T31189] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1081.481327][T31189] ? __fget+0x35a/0x550 [ 1081.485952][T31189] block_ioctl+0xee/0x130 [ 1081.490517][T31189] ? blkdev_fallocate+0x410/0x410 [ 1081.496144][T31189] do_vfs_ioctl+0xd6e/0x1390 04:54:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1081.500775][T31189] ? ioctl_preallocate+0x210/0x210 [ 1081.506062][T31189] ? __fget+0x381/0x550 [ 1081.511221][T31189] ? ksys_dup3+0x3e0/0x3e0 [ 1081.516266][T31189] ? do_sys_open+0x31d/0x5d0 [ 1081.521014][T31189] ? tomoyo_file_ioctl+0x23/0x30 [ 1081.526545][T31189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1081.533352][T31189] ? security_file_ioctl+0x93/0xc0 [ 1081.538591][T31189] ksys_ioctl+0xab/0xd0 [ 1081.542888][T31189] __x64_sys_ioctl+0x73/0xb0 [ 1081.547693][T31189] do_syscall_64+0x103/0x610 [ 1081.552739][T31189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.559048][T31189] RIP: 0033:0x458077 [ 1081.563148][T31189] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1081.585439][T31189] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.594675][T31189] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 04:54:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}]}, 0x2c}}, 0x0) [ 1081.603751][T31189] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1081.612229][T31189] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1081.622510][T31189] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1081.632227][T31189] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:21 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe]}, 0x63) 04:54:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}}]}, 0x2c}}, 0x0) 04:54:21 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:21 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fffffffb4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1082.223179][T31223] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1082.241912][T31228] FAULT_INJECTION: forcing a failure. [ 1082.241912][T31228] name failslab, interval 1, probability 0, space 0, times 0 04:54:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}}]}, 0x2c}}, 0x0) [ 1082.277706][T31228] CPU: 0 PID: 31228 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1082.287836][T31228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.298614][T31228] Call Trace: [ 1082.302565][T31228] dump_stack+0x172/0x1f0 [ 1082.306968][T31228] should_fail.cold+0xa/0x15 [ 1082.312680][T31228] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1082.319021][T31228] ? ___might_sleep+0x163/0x280 [ 1082.324102][T31228] __should_failslab+0x121/0x190 [ 1082.329459][T31228] should_failslab+0x9/0x14 [ 1082.334824][T31228] kmem_cache_alloc+0x2b2/0x6f0 [ 1082.341930][T31228] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1082.347937][T31228] ? lock_downgrade+0x880/0x880 [ 1082.352844][T31228] skb_clone+0x150/0x3b0 [ 1082.357456][T31228] netlink_broadcast_filtered+0x870/0xb20 [ 1082.363495][T31228] netlink_broadcast+0x3a/0x50 [ 1082.368290][T31228] kobject_uevent_env+0xa94/0x1030 [ 1082.373540][T31228] kobject_uevent+0x20/0x26 04:54:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1082.378113][T31228] lo_ioctl+0x112b/0x2150 [ 1082.382782][T31228] ? lo_rw_aio+0x1120/0x1120 [ 1082.387416][T31228] blkdev_ioctl+0xee8/0x1c40 [ 1082.392752][T31228] ? blkpg_ioctl+0xa90/0xa90 [ 1082.397460][T31228] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1082.403474][T31228] ? __fget+0x35a/0x550 [ 1082.407906][T31228] block_ioctl+0xee/0x130 [ 1082.412260][T31228] ? blkdev_fallocate+0x410/0x410 [ 1082.417389][T31228] do_vfs_ioctl+0xd6e/0x1390 [ 1082.421998][T31228] ? ioctl_preallocate+0x210/0x210 [ 1082.427314][T31228] ? __fget+0x381/0x550 [ 1082.432176][T31228] ? ksys_dup3+0x3e0/0x3e0 [ 1082.436624][T31228] ? do_sys_open+0x31d/0x5d0 [ 1082.441340][T31228] ? tomoyo_file_ioctl+0x23/0x30 [ 1082.446488][T31228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1082.453875][T31228] ? security_file_ioctl+0x93/0xc0 [ 1082.459135][T31228] ksys_ioctl+0xab/0xd0 [ 1082.463326][T31228] __x64_sys_ioctl+0x73/0xb0 [ 1082.468218][T31228] do_syscall_64+0x103/0x610 [ 1082.473038][T31228] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:54:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1082.479048][T31228] RIP: 0033:0x458077 [ 1082.483140][T31228] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1082.503869][T31228] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1082.512774][T31228] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458077 [ 1082.521363][T31228] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1082.529887][T31228] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1082.538160][T31228] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1082.546413][T31228] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:22 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fffffdfc4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1082.831854][T31248] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1082.899151][T31248] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:22 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xf]}, 0x63) 04:54:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}]}, 0x2c}}, 0x0) 04:54:22 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:22 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fffffdfd4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1083.224506][T31259] FAULT_INJECTION: forcing a failure. [ 1083.224506][T31259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1083.244780][T31259] CPU: 1 PID: 31259 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1083.254297][T31259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.265186][T31259] Call Trace: [ 1083.268936][T31259] dump_stack+0x172/0x1f0 [ 1083.273392][T31259] should_fail.cold+0xa/0x15 [ 1083.278108][T31259] ? lo_ioctl+0xcf/0x2150 [ 1083.282750][T31259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1083.288969][T31259] ? __lock_acquire+0x548/0x3fb0 [ 1083.294240][T31259] should_fail_alloc_page+0x50/0x60 [ 1083.299823][T31259] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1083.305998][T31259] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1083.312386][T31259] ? find_held_lock+0x35/0x130 [ 1083.317195][T31259] ? __fget+0x35a/0x550 [ 1083.321552][T31259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1083.327833][T31259] cache_grow_begin+0x9c/0x860 [ 1083.333420][T31259] ? getname_flags+0xd6/0x5b0 [ 1083.338202][T31259] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1083.345525][T31259] kmem_cache_alloc+0x62d/0x6f0 [ 1083.350799][T31259] ? __fget+0x381/0x550 [ 1083.355259][T31259] getname_flags+0xd6/0x5b0 [ 1083.360089][T31259] do_mkdirat+0xa0/0x2a0 [ 1083.364454][T31259] ? __ia32_sys_mknod+0xb0/0xb0 [ 1083.369516][T31259] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1083.375365][T31259] ? do_syscall_64+0x26/0x610 [ 1083.380570][T31259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.386754][T31259] ? do_syscall_64+0x26/0x610 [ 1083.391559][T31259] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1083.397044][T31259] __x64_sys_mkdir+0x5c/0x80 [ 1083.401835][T31259] do_syscall_64+0x103/0x610 [ 1083.406454][T31259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.412545][T31259] RIP: 0033:0x457627 [ 1083.416547][T31259] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1083.436266][T31259] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1083.445082][T31259] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1083.453679][T31259] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1083.461895][T31259] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 04:54:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}}]}, 0x2c}}, 0x0) [ 1083.469979][T31259] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1083.478344][T31259] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1083.511721][T31260] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}]}, 0x2c}}, 0x0) 04:54:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:23 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1083.715909][T31260] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1083.805731][T31286] FAULT_INJECTION: forcing a failure. [ 1083.805731][T31286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1083.822667][T31286] CPU: 0 PID: 31286 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1083.832227][T31286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.846649][T31286] Call Trace: [ 1083.850247][T31286] dump_stack+0x172/0x1f0 [ 1083.854872][T31286] should_fail.cold+0xa/0x15 [ 1083.859674][T31286] ? lo_ioctl+0xcf/0x2150 [ 1083.864782][T31286] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1083.870895][T31286] ? __lock_acquire+0x548/0x3fb0 [ 1083.876047][T31286] should_fail_alloc_page+0x50/0x60 [ 1083.881536][T31286] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1083.887753][T31286] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1083.893895][T31286] ? find_held_lock+0x35/0x130 [ 1083.898890][T31286] ? __fget+0x35a/0x550 [ 1083.903343][T31286] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1083.909673][T31286] cache_grow_begin+0x9c/0x860 [ 1083.914817][T31286] ? getname_flags+0xd6/0x5b0 [ 1083.919729][T31286] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1083.926657][T31286] kmem_cache_alloc+0x62d/0x6f0 [ 1083.931967][T31286] ? __fget+0x381/0x550 [ 1083.936240][T31286] getname_flags+0xd6/0x5b0 [ 1083.940971][T31286] do_mkdirat+0xa0/0x2a0 [ 1083.945569][T31286] ? __ia32_sys_mknod+0xb0/0xb0 [ 1083.950791][T31286] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1083.956271][T31286] ? do_syscall_64+0x26/0x610 [ 1083.961265][T31286] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.967548][T31286] ? do_syscall_64+0x26/0x610 [ 1083.972649][T31286] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1083.978210][T31286] __x64_sys_mkdir+0x5c/0x80 [ 1083.982998][T31286] do_syscall_64+0x103/0x610 [ 1083.987713][T31286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.994158][T31286] RIP: 0033:0x457627 [ 1083.998157][T31286] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1084.019019][T31286] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1084.028686][T31286] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1084.036831][T31286] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1084.045642][T31286] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1084.054134][T31286] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1084.062684][T31286] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:24 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10]}, 0x63) 04:54:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}]}, 0x2c}}, 0x0) 04:54:24 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fffffffe4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:24 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1084.437109][T31295] FAULT_INJECTION: forcing a failure. [ 1084.437109][T31295] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.471925][T31297] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1084.501683][T31295] CPU: 0 PID: 31295 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1084.511063][T31295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.521949][T31295] Call Trace: [ 1084.525403][T31295] dump_stack+0x172/0x1f0 [ 1084.530045][T31295] should_fail.cold+0xa/0x15 [ 1084.534727][T31295] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1084.540892][T31295] ? ___might_sleep+0x163/0x280 [ 1084.546103][T31295] __should_failslab+0x121/0x190 [ 1084.551169][T31295] ? ratelimit_state_init+0xb0/0xb0 [ 1084.556492][T31295] should_failslab+0x9/0x14 [ 1084.561169][T31295] kmem_cache_alloc+0x2b2/0x6f0 [ 1084.566118][T31295] ? __save_stack_trace+0x99/0x100 [ 1084.571270][T31295] ? ratelimit_state_init+0xb0/0xb0 [ 1084.576569][T31295] ext4_alloc_inode+0x1f/0x640 [ 1084.581454][T31295] ? ratelimit_state_init+0xb0/0xb0 [ 1084.586858][T31295] alloc_inode+0x66/0x190 [ 1084.591378][T31295] new_inode_pseudo+0x19/0xf0 [ 1084.596084][T31295] new_inode+0x1f/0x40 [ 1084.600184][T31295] __ext4_new_inode+0x37e/0x5450 [ 1084.605910][T31295] ? debug_check_no_obj_freed+0x211/0x444 [ 1084.611858][T31295] ? ext4_free_inode+0x1450/0x1450 [ 1084.617111][T31295] ? dqget+0x10d0/0x10d0 [ 1084.621486][T31295] ext4_mkdir+0x3d5/0xdf0 [ 1084.626165][T31295] ? ext4_init_dot_dotdot+0x520/0x520 [ 1084.631657][T31295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.638503][T31295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.646231][T31295] ? security_inode_permission+0xd5/0x110 [ 1084.652083][T31295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.659773][T31295] ? security_inode_mkdir+0xee/0x120 [ 1084.665241][T31295] vfs_mkdir+0x433/0x690 [ 1084.669960][T31295] do_mkdirat+0x234/0x2a0 [ 1084.674407][T31295] ? __ia32_sys_mknod+0xb0/0xb0 [ 1084.680711][T31295] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1084.686719][T31295] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.692909][T31295] ? do_syscall_64+0x26/0x610 [ 1084.697702][T31295] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1084.703213][T31295] __x64_sys_mkdir+0x5c/0x80 [ 1084.707828][T31295] do_syscall_64+0x103/0x610 [ 1084.712607][T31295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.720566][T31295] RIP: 0033:0x457627 [ 1084.724654][T31295] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:54:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x521]}}]}, 0x2c}}, 0x0) [ 1084.745365][T31295] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1084.754628][T31295] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1084.763134][T31295] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1084.771579][T31295] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1084.780064][T31295] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1084.788391][T31295] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}]}, 0x2c}}, 0x0) 04:54:24 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000000100000fff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1085.002136][T31318] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1085.069995][T31318] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:25 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x11]}, 0x63) 04:54:25 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}]}, 0x2c}}, 0x0) 04:54:25 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001f9fdffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1085.416132][T31337] FAULT_INJECTION: forcing a failure. [ 1085.416132][T31337] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1085.429377][T31337] CPU: 1 PID: 31337 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1085.438679][T31337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.448747][T31337] Call Trace: [ 1085.452069][T31337] dump_stack+0x172/0x1f0 [ 1085.456415][T31337] should_fail.cold+0xa/0x15 [ 1085.461026][T31337] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1085.466850][T31337] ? percpu_ref_tryget_live+0xef/0x290 [ 1085.472337][T31337] should_fail_alloc_page+0x50/0x60 [ 1085.477704][T31337] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1085.483085][T31337] ? find_held_lock+0x35/0x130 [ 1085.487855][T31337] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1085.493872][T31337] cache_grow_begin+0x9c/0x860 [ 1085.498775][T31337] ? ext4_alloc_inode+0x1f/0x640 [ 1085.503717][T31337] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1085.509986][T31337] kmem_cache_alloc+0x62d/0x6f0 [ 1085.514841][T31337] ? __save_stack_trace+0x99/0x100 [ 1085.519963][T31337] ? ratelimit_state_init+0xb0/0xb0 [ 1085.525429][T31337] ext4_alloc_inode+0x1f/0x640 [ 1085.530213][T31337] ? ratelimit_state_init+0xb0/0xb0 [ 1085.535808][T31337] alloc_inode+0x66/0x190 [ 1085.540142][T31337] new_inode_pseudo+0x19/0xf0 [ 1085.544824][T31337] new_inode+0x1f/0x40 [ 1085.548983][T31337] __ext4_new_inode+0x37e/0x5450 [ 1085.554024][T31337] ? debug_check_no_obj_freed+0x211/0x444 [ 1085.559774][T31337] ? ext4_free_inode+0x1450/0x1450 [ 1085.565023][T31337] ? dqget+0x10d0/0x10d0 [ 1085.569286][T31337] ext4_mkdir+0x3d5/0xdf0 [ 1085.573947][T31337] ? ext4_init_dot_dotdot+0x520/0x520 [ 1085.579426][T31337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1085.585765][T31337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1085.592021][T31337] ? security_inode_permission+0xd5/0x110 [ 1085.597848][T31337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1085.604094][T31337] ? security_inode_mkdir+0xee/0x120 [ 1085.609389][T31337] vfs_mkdir+0x433/0x690 [ 1085.613732][T31337] do_mkdirat+0x234/0x2a0 [ 1085.618076][T31337] ? __ia32_sys_mknod+0xb0/0xb0 [ 1085.622930][T31337] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1085.628401][T31337] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1085.634479][T31337] ? do_syscall_64+0x26/0x610 [ 1085.639164][T31337] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1085.644464][T31337] __x64_sys_mkdir+0x5c/0x80 [ 1085.649081][T31337] do_syscall_64+0x103/0x610 [ 1085.653687][T31337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1085.659844][T31337] RIP: 0033:0x457627 [ 1085.663743][T31337] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1085.683444][T31337] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1085.692122][T31337] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1085.700094][T31337] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1085.708165][T31337] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 04:54:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}]}, 0x2c}}, 0x0) [ 1085.716225][T31337] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1085.724653][T31337] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1085.736983][T31335] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:25 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fcfdffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}}]}, 0x2c}}, 0x0) 04:54:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1085.998520][T31355] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1086.078339][T31355] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:26 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x12]}, 0x63) 04:54:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:26 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}]}, 0x2c}}, 0x0) 04:54:26 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fdfdffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}]}, 0x2c}}, 0x0) [ 1086.711563][T31368] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1086.732401][T31375] FAULT_INJECTION: forcing a failure. [ 1086.732401][T31375] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.760364][T31375] CPU: 1 PID: 31375 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1086.769818][T31375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.780153][T31375] Call Trace: [ 1086.783505][T31375] dump_stack+0x172/0x1f0 [ 1086.787873][T31375] should_fail.cold+0xa/0x15 [ 1086.792595][T31375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1086.798419][T31375] ? ___might_sleep+0x163/0x280 [ 1086.803454][T31375] __should_failslab+0x121/0x190 [ 1086.808406][T31375] should_failslab+0x9/0x14 [ 1086.812918][T31375] __kmalloc+0x2dc/0x740 [ 1086.817169][T31375] ? mark_held_locks+0xa4/0xf0 [ 1086.822117][T31375] ? kfree+0x173/0x230 [ 1086.826191][T31375] ? ext4_find_extent+0x76e/0x9d0 [ 1086.831313][T31375] ext4_find_extent+0x76e/0x9d0 [ 1086.836192][T31375] ext4_ext_map_blocks+0x1cc/0x5300 [ 1086.841529][T31375] ? ext4_ext_release+0x10/0x10 [ 1086.846384][T31375] ? find_held_lock+0x35/0x130 [ 1086.851161][T31375] ? lock_acquire+0x16f/0x3f0 [ 1086.855956][T31375] ? ext4_map_blocks+0x85d/0x18e0 [ 1086.860994][T31375] ext4_map_blocks+0x8c5/0x18e0 [ 1086.865863][T31375] ? ext4_issue_zeroout+0x190/0x190 [ 1086.871072][T31375] ? kasan_check_write+0x14/0x20 [ 1086.876055][T31375] ? __brelse+0x95/0xb0 [ 1086.880228][T31375] ext4_getblk+0xc4/0x510 [ 1086.884615][T31375] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1086.889912][T31375] ? ext4_free_inode+0x1450/0x1450 [ 1086.895041][T31375] ext4_bread+0x8f/0x230 [ 1086.899383][T31375] ? ext4_getblk+0x510/0x510 [ 1086.903989][T31375] ext4_append+0x155/0x370 [ 1086.908417][T31375] ext4_mkdir+0x61b/0xdf0 [ 1086.912767][T31375] ? ext4_init_dot_dotdot+0x520/0x520 [ 1086.918161][T31375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1086.924487][T31375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1086.930737][T31375] ? security_inode_permission+0xd5/0x110 [ 1086.936649][T31375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1086.942990][T31375] ? security_inode_mkdir+0xee/0x120 [ 1086.948282][T31375] vfs_mkdir+0x433/0x690 [ 1086.952650][T31375] do_mkdirat+0x234/0x2a0 [ 1086.956994][T31375] ? __ia32_sys_mknod+0xb0/0xb0 [ 1086.961937][T31375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1086.967402][T31375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1086.973564][T31375] ? do_syscall_64+0x26/0x610 [ 1086.978268][T31375] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1086.983719][T31375] __x64_sys_mkdir+0x5c/0x80 [ 1086.988326][T31375] do_syscall_64+0x103/0x610 [ 1086.992930][T31375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1086.998819][T31375] RIP: 0033:0x457627 [ 1087.002719][T31375] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1087.022419][T31375] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1087.030925][T31375] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1087.039077][T31375] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1087.047054][T31375] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1087.055118][T31375] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 04:54:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x126772, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1087.063093][T31375] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}}]}, 0x2c}}, 0x0) [ 1087.109535][T31368] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:26 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1087.273771][T31390] FAULT_INJECTION: forcing a failure. [ 1087.273771][T31390] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.345082][T31390] CPU: 1 PID: 31390 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1087.354337][T31390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.364404][T31390] Call Trace: [ 1087.367842][T31390] dump_stack+0x172/0x1f0 [ 1087.372193][T31390] should_fail.cold+0xa/0x15 [ 1087.376807][T31390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1087.382805][T31390] ? ___might_sleep+0x163/0x280 [ 1087.387664][T31390] __should_failslab+0x121/0x190 [ 1087.392637][T31390] should_failslab+0x9/0x14 [ 1087.397149][T31390] __kmalloc+0x2dc/0x740 [ 1087.401401][T31390] ? mark_held_locks+0xa4/0xf0 [ 1087.406172][T31390] ? kfree+0x173/0x230 [ 1087.410246][T31390] ? ext4_find_extent+0x76e/0x9d0 [ 1087.415302][T31390] ext4_find_extent+0x76e/0x9d0 [ 1087.420177][T31390] ext4_ext_map_blocks+0x1cc/0x5300 [ 1087.425486][T31390] ? ext4_ext_release+0x10/0x10 [ 1087.430539][T31390] ? find_held_lock+0x35/0x130 [ 1087.435404][T31390] ? lock_acquire+0x16f/0x3f0 [ 1087.440088][T31390] ? ext4_map_blocks+0x85d/0x18e0 [ 1087.445155][T31390] ext4_map_blocks+0x8c5/0x18e0 [ 1087.450021][T31390] ? ext4_issue_zeroout+0x190/0x190 [ 1087.455238][T31390] ? kasan_check_write+0x14/0x20 [ 1087.460186][T31390] ? __brelse+0x95/0xb0 [ 1087.464365][T31390] ext4_getblk+0xc4/0x510 [ 1087.468971][T31390] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1087.474112][T31390] ? ext4_free_inode+0x1450/0x1450 [ 1087.479239][T31390] ext4_bread+0x8f/0x230 [ 1087.483525][T31390] ? ext4_getblk+0x510/0x510 [ 1087.488219][T31390] ext4_append+0x155/0x370 [ 1087.492643][T31390] ext4_mkdir+0x61b/0xdf0 [ 1087.497132][T31390] ? ext4_init_dot_dotdot+0x520/0x520 [ 1087.502535][T31390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.508778][T31390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.515174][T31390] ? security_inode_permission+0xd5/0x110 [ 1087.521351][T31390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.527698][T31390] ? security_inode_mkdir+0xee/0x120 [ 1087.532997][T31390] vfs_mkdir+0x433/0x690 [ 1087.537250][T31390] do_mkdirat+0x234/0x2a0 [ 1087.541597][T31390] ? __ia32_sys_mknod+0xb0/0xb0 [ 1087.546463][T31390] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1087.552031][T31390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.558109][T31390] ? do_syscall_64+0x26/0x610 [ 1087.562891][T31390] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1087.568202][T31390] __x64_sys_mkdir+0x5c/0x80 [ 1087.572885][T31390] do_syscall_64+0x103/0x610 [ 1087.577488][T31390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.583547][T31390] RIP: 0033:0x457627 [ 1087.587559][T31390] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1087.607269][T31390] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1087.615801][T31390] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1087.623987][T31390] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1087.631960][T31390] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1087.639937][T31390] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1087.647927][T31390] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:27 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x13]}, 0x63) 04:54:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}]}, 0x2c}}, 0x0) 04:54:27 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000017fffffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:27 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}}]}, 0x2c}}, 0x0) [ 1087.816342][T31402] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1087.887679][T31409] FAULT_INJECTION: forcing a failure. [ 1087.887679][T31409] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.901153][T31409] CPU: 1 PID: 31409 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1087.910364][T31409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.910462][T31409] Call Trace: [ 1087.910491][T31409] dump_stack+0x172/0x1f0 [ 1087.910515][T31409] should_fail.cold+0xa/0x15 [ 1087.910535][T31409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1087.910552][T31409] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1087.910572][T31409] __should_failslab+0x121/0x190 [ 1087.928248][T31409] should_failslab+0x9/0x14 [ 1087.928267][T31409] kmem_cache_alloc+0x47/0x6f0 [ 1087.928282][T31409] ? ext4_es_scan+0x6f0/0x6f0 [ 1087.928304][T31409] ? do_raw_write_lock+0x124/0x290 [ 1087.944505][T31409] __es_insert_extent+0x2cc/0xf20 [ 1087.944529][T31409] ext4_es_insert_extent+0x2b7/0xa40 [ 1087.944547][T31409] ? ext4_es_scan_clu+0x50/0x50 [ 1087.954083][T31409] ? rcu_read_lock_sched_held+0x110/0x130 [ 1087.954105][T31409] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1087.954123][T31409] ? ext4_es_find_extent_range+0xff/0x600 [ 1087.963627][T31409] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1087.963646][T31409] ? ext4_rereserve_cluster+0x240/0x240 [ 1087.963665][T31409] ? ext4_find_extent+0x76e/0x9d0 [ 1088.017942][T31409] ? ext4_find_extent+0x6a6/0x9d0 [ 1088.023000][T31409] ext4_ext_map_blocks+0x2146/0x5300 [ 1088.028538][T31409] ? ext4_ext_release+0x10/0x10 [ 1088.033405][T31409] ? lock_acquire+0x16f/0x3f0 [ 1088.038091][T31409] ? ext4_map_blocks+0x3fd/0x18e0 [ 1088.043137][T31409] ext4_map_blocks+0xec7/0x18e0 [ 1088.048078][T31409] ? ext4_issue_zeroout+0x190/0x190 [ 1088.053295][T31409] ? kasan_check_write+0x14/0x20 [ 1088.058249][T31409] ? __brelse+0x95/0xb0 [ 1088.062518][T31409] ext4_getblk+0xc4/0x510 [ 1088.071248][T31409] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1088.076381][T31409] ? ext4_free_inode+0x1450/0x1450 [ 1088.081849][T31409] ext4_bread+0x8f/0x230 [ 1088.086289][T31409] ? ext4_getblk+0x510/0x510 [ 1088.090889][T31409] ext4_append+0x155/0x370 [ 1088.095401][T31409] ext4_mkdir+0x61b/0xdf0 [ 1088.099829][T31409] ? ext4_init_dot_dotdot+0x520/0x520 [ 1088.105203][T31409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1088.111483][T31409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1088.117738][T31409] ? security_inode_permission+0xd5/0x110 [ 1088.123475][T31409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1088.129723][T31409] ? security_inode_mkdir+0xee/0x120 [ 1088.135175][T31409] vfs_mkdir+0x433/0x690 [ 1088.139456][T31409] do_mkdirat+0x234/0x2a0 [ 1088.143789][T31409] ? __ia32_sys_mknod+0xb0/0xb0 [ 1088.148657][T31409] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1088.154213][T31409] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.160382][T31409] ? do_syscall_64+0x26/0x610 [ 1088.165064][T31409] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1088.170540][T31409] __x64_sys_mkdir+0x5c/0x80 [ 1088.175134][T31409] do_syscall_64+0x103/0x610 [ 1088.179738][T31409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.185839][T31409] RIP: 0033:0x457627 [ 1088.189745][T31409] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1088.209576][T31409] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1088.218183][T31409] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1088.226263][T31409] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 04:54:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:28 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff99000000400001000000018cffffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1088.234778][T31409] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1088.242750][T31409] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1088.250725][T31409] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300]}}]}, 0x2c}}, 0x0) 04:54:28 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1088.423619][T31421] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105]}}]}, 0x2c}}, 0x0) 04:54:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1088.532128][T31429] FAULT_INJECTION: forcing a failure. [ 1088.532128][T31429] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.545125][T31429] CPU: 0 PID: 31429 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1088.554254][T31429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.564320][T31429] Call Trace: [ 1088.567712][T31429] dump_stack+0x172/0x1f0 [ 1088.572359][T31429] should_fail.cold+0xa/0x15 [ 1088.576962][T31429] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1088.582787][T31429] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1088.588457][T31429] __should_failslab+0x121/0x190 [ 1088.593410][T31429] should_failslab+0x9/0x14 [ 1088.597920][T31429] kmem_cache_alloc+0x47/0x6f0 [ 1088.602713][T31429] ? ext4_es_scan+0x6f0/0x6f0 [ 1088.607588][T31429] ? do_raw_write_lock+0x124/0x290 [ 1088.612805][T31429] __es_insert_extent+0x2cc/0xf20 [ 1088.617855][T31429] ext4_es_insert_extent+0x2b7/0xa40 [ 1088.623165][T31429] ? ext4_es_scan_clu+0x50/0x50 [ 1088.628058][T31429] ? rcu_read_lock_sched_held+0x110/0x130 [ 1088.633817][T31429] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1088.640227][T31429] ? ext4_es_find_extent_range+0xff/0x600 [ 1088.646047][T31429] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1088.651597][T31429] ? ext4_rereserve_cluster+0x240/0x240 [ 1088.657426][T31429] ? ext4_find_extent+0x76e/0x9d0 [ 1088.662469][T31429] ? ext4_find_extent+0x6a6/0x9d0 [ 1088.662493][T31429] ext4_ext_map_blocks+0x2146/0x5300 [ 1088.662513][T31429] ? ext4_ext_release+0x10/0x10 [ 1088.662545][T31429] ? lock_acquire+0x16f/0x3f0 [ 1088.662558][T31429] ? ext4_map_blocks+0x3fd/0x18e0 [ 1088.662578][T31429] ext4_map_blocks+0xec7/0x18e0 [ 1088.662598][T31429] ? ext4_issue_zeroout+0x190/0x190 [ 1088.662617][T31429] ? kasan_check_write+0x14/0x20 [ 1088.662629][T31429] ? __brelse+0x95/0xb0 [ 1088.662648][T31429] ext4_getblk+0xc4/0x510 [ 1088.662663][T31429] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1088.662682][T31429] ? ext4_free_inode+0x1450/0x1450 [ 1088.662698][T31429] ext4_bread+0x8f/0x230 [ 1088.662712][T31429] ? ext4_getblk+0x510/0x510 [ 1088.662734][T31429] ext4_append+0x155/0x370 [ 1088.662752][T31429] ext4_mkdir+0x61b/0xdf0 [ 1088.662772][T31429] ? ext4_init_dot_dotdot+0x520/0x520 [ 1088.662798][T31429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1088.673393][T31429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1088.673411][T31429] ? security_inode_permission+0xd5/0x110 [ 1088.673425][T31429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1088.673437][T31429] ? security_inode_mkdir+0xee/0x120 [ 1088.673455][T31429] vfs_mkdir+0x433/0x690 [ 1088.673472][T31429] do_mkdirat+0x234/0x2a0 [ 1088.673486][T31429] ? __ia32_sys_mknod+0xb0/0xb0 [ 1088.673511][T31429] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1088.688159][T31429] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.688184][T31429] ? do_syscall_64+0x26/0x610 [ 1088.688204][T31429] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1088.698735][T31429] __x64_sys_mkdir+0x5c/0x80 [ 1088.698757][T31429] do_syscall_64+0x103/0x610 [ 1088.698786][T31429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.827450][T31429] RIP: 0033:0x457627 [ 1088.831362][T31429] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1088.850978][T31429] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1088.859493][T31429] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1088.867578][T31429] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1088.875666][T31429] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 04:54:28 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x14]}, 0x63) 04:54:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0e00000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1088.883641][T31429] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1088.883650][T31429] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:28 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001f4ffffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0200000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}]}, 0x2c}}, 0x0) 04:54:28 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1089.116423][T31449] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1089.130680][T31454] FAULT_INJECTION: forcing a failure. [ 1089.130680][T31454] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.144813][T31454] CPU: 0 PID: 31454 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1089.154046][T31454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.164208][T31454] Call Trace: [ 1089.167611][T31454] dump_stack+0x172/0x1f0 [ 1089.172058][T31454] should_fail.cold+0xa/0x15 [ 1089.176806][T31454] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1089.182635][T31454] ? ___might_sleep+0x163/0x280 [ 1089.187521][T31454] __should_failslab+0x121/0x190 [ 1089.192569][T31454] should_failslab+0x9/0x14 [ 1089.197088][T31454] kmem_cache_alloc+0x2b2/0x6f0 [ 1089.201955][T31454] ? rcu_read_lock_sched_held+0x110/0x130 [ 1089.207682][T31454] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1089.213935][T31454] ? __mark_inode_dirty+0x241/0x1290 [ 1089.219233][T31454] ext4_mb_new_blocks+0x5a8/0x3c70 [ 1089.224360][T31454] ? mark_held_locks+0xa4/0xf0 [ 1089.229139][T31454] ? ext4_find_extent+0x76e/0x9d0 [ 1089.239297][T31454] ext4_ext_map_blocks+0x2c28/0x5300 [ 1089.244697][T31454] ? ext4_ext_release+0x10/0x10 [ 1089.249562][T31454] ? find_held_lock+0x35/0x130 [ 1089.254363][T31454] ext4_map_blocks+0x8c5/0x18e0 [ 1089.259230][T31454] ? ext4_issue_zeroout+0x190/0x190 [ 1089.264889][T31454] ? kasan_check_write+0x14/0x20 [ 1089.269918][T31454] ? __brelse+0x95/0xb0 [ 1089.274112][T31454] ext4_getblk+0xc4/0x510 [ 1089.278460][T31454] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1089.283508][T31454] ? ext4_free_inode+0x1450/0x1450 [ 1089.288811][T31454] ext4_bread+0x8f/0x230 [ 1089.293064][T31454] ? ext4_getblk+0x510/0x510 [ 1089.297675][T31454] ext4_append+0x155/0x370 [ 1089.302106][T31454] ext4_mkdir+0x61b/0xdf0 [ 1089.306463][T31454] ? ext4_init_dot_dotdot+0x520/0x520 [ 1089.312026][T31454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1089.318650][T31454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1089.324991][T31454] ? security_inode_permission+0xd5/0x110 [ 1089.330729][T31454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1089.337241][T31454] ? security_inode_mkdir+0xee/0x120 [ 1089.342564][T31454] vfs_mkdir+0x433/0x690 [ 1089.346820][T31454] do_mkdirat+0x234/0x2a0 [ 1089.351176][T31454] ? __ia32_sys_mknod+0xb0/0xb0 [ 1089.356029][T31454] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1089.361528][T31454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.367596][T31454] ? do_syscall_64+0x26/0x610 [ 1089.372290][T31454] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1089.377675][T31454] __x64_sys_mkdir+0x5c/0x80 [ 1089.382271][T31454] do_syscall_64+0x103/0x610 [ 1089.386879][T31454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.392901][T31454] RIP: 0033:0x457627 [ 1089.396801][T31454] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:54:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5865]}}]}, 0x2c}}, 0x0) 04:54:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1089.416413][T31454] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1089.424852][T31454] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1089.432829][T31454] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1089.440909][T31454] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1089.448892][T31454] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1089.456962][T31454] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1089.508849][T31449] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}]}, 0x2c}}, 0x0) 04:54:29 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001f5ffffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1089.749692][T31472] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:29 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x15]}, 0x63) 04:54:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0600000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:29 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558]}}]}, 0x2c}}, 0x0) 04:54:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1089.827780][T31472] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:29 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001f6ffffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}}]}, 0x2c}}, 0x0) [ 1089.976989][T31484] FAULT_INJECTION: forcing a failure. [ 1089.976989][T31484] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.005138][T31484] CPU: 0 PID: 31484 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1090.014294][T31484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.024369][T31484] Call Trace: [ 1090.027681][T31484] dump_stack+0x172/0x1f0 [ 1090.032052][T31484] should_fail.cold+0xa/0x15 [ 1090.032079][T31484] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1090.032093][T31484] ? finish_task_switch+0x118/0x780 [ 1090.032110][T31484] ? __switch_to_asm+0x34/0x70 [ 1090.032121][T31484] ? __switch_to_asm+0x40/0x70 [ 1090.032142][T31484] __should_failslab+0x121/0x190 [ 1090.032159][T31484] should_failslab+0x9/0x14 [ 1090.032173][T31484] kmem_cache_alloc+0x47/0x6f0 [ 1090.032190][T31484] ? ___might_sleep+0x163/0x280 [ 1090.052874][T31484] ? mempool_alloc+0x380/0x380 [ 1090.052888][T31484] mempool_alloc_slab+0x47/0x60 [ 1090.052904][T31484] mempool_alloc+0x16b/0x380 [ 1090.052915][T31484] ? io_schedule+0x1c/0x70 [ 1090.052933][T31484] ? mempool_destroy+0x40/0x40 [ 1090.052948][T31484] ? mark_held_locks+0xf0/0xf0 [ 1090.052966][T31484] ? __unlock_page_memcg+0x53/0x100 [ 1090.052978][T31484] ? find_held_lock+0x35/0x130 [ 1090.053000][T31484] bio_alloc_bioset+0x3bf/0x680 [ 1090.053017][T31484] ? bvec_alloc+0x2f0/0x2f0 [ 1090.053034][T31484] ? kasan_check_read+0x11/0x20 [ 1090.053065][T31484] submit_bh_wbc+0x133/0x7f0 [ 1090.053086][T31484] __sync_dirty_buffer+0x111/0x2e0 [ 1090.053099][T31484] sync_dirty_buffer+0x1b/0x20 [ 1090.053116][T31484] __ext4_handle_dirty_metadata+0x237/0x570 [ 1090.053137][T31484] ext4_handle_dirty_dirent_node+0x3cf/0x4f0 [ 1090.053151][T31484] ? __might_sleep+0x95/0x190 [ 1090.053165][T31484] ? ext4_rename_dir_prepare+0x460/0x460 [ 1090.053186][T31484] ? memcpy+0x46/0x50 [ 1090.171767][T31484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:54:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}}]}, 0x2c}}, 0x0) [ 1090.178036][T31484] ? ext4_init_dot_dotdot+0x39c/0x520 [ 1090.183531][T31484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1090.189798][T31484] ext4_mkdir+0x6c9/0xdf0 [ 1090.194149][T31484] ? ext4_init_dot_dotdot+0x520/0x520 [ 1090.199586][T31484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1090.206031][T31484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1090.212393][T31484] ? security_inode_permission+0xd5/0x110 [ 1090.218152][T31484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:54:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1090.224558][T31484] ? security_inode_mkdir+0xee/0x120 [ 1090.229950][T31484] vfs_mkdir+0x433/0x690 [ 1090.234724][T31484] do_mkdirat+0x234/0x2a0 [ 1090.239093][T31484] ? __ia32_sys_mknod+0xb0/0xb0 [ 1090.244075][T31484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1090.249657][T31484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.255839][T31484] ? do_syscall_64+0x26/0x610 [ 1090.260545][T31484] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1090.265953][T31484] __x64_sys_mkdir+0x5c/0x80 [ 1090.270665][T31484] do_syscall_64+0x103/0x610 [ 1090.275313][T31484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.281314][T31484] RIP: 0033:0x457627 [ 1090.286103][T31484] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.305982][T31484] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1090.314598][T31484] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 04:54:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}]}, 0x2c}}, 0x0) [ 1090.322592][T31484] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1090.330853][T31484] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1090.339134][T31484] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1090.347231][T31484] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1090.411576][T31496] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1090.535450][T31496] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:30 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x18]}, 0x63) 04:54:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:30 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}]}, 0x2c}}, 0x0) 04:54:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000020000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:30 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001fbffffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1090.932276][T31520] FAULT_INJECTION: forcing a failure. [ 1090.932276][T31520] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.955230][T31517] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}}]}, 0x2c}}, 0x0) [ 1091.005729][T31520] CPU: 1 PID: 31520 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1091.015015][T31520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.025123][T31520] Call Trace: [ 1091.028441][T31520] dump_stack+0x172/0x1f0 [ 1091.032962][T31520] should_fail.cold+0xa/0x15 [ 1091.037570][T31520] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1091.043379][T31520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.049836][T31520] ? should_fail+0x1de/0x852 [ 1091.054534][T31520] __should_failslab+0x121/0x190 [ 1091.059478][T31520] should_failslab+0x9/0x14 [ 1091.064076][T31520] kmem_cache_alloc+0x47/0x6f0 [ 1091.068978][T31520] ? ___might_sleep+0x163/0x280 [ 1091.073864][T31520] ? mempool_alloc+0x380/0x380 [ 1091.078643][T31520] mempool_alloc_slab+0x47/0x60 [ 1091.083502][T31520] mempool_alloc+0x16b/0x380 [ 1091.088114][T31520] ? mempool_destroy+0x40/0x40 [ 1091.092886][T31520] ? mark_held_locks+0xf0/0xf0 [ 1091.097848][T31520] bio_alloc_bioset+0x3bf/0x680 [ 1091.102710][T31520] ? mark_buffer_dirty_inode+0x305/0x410 [ 1091.108549][T31520] ? bvec_alloc+0x2f0/0x2f0 [ 1091.113071][T31520] submit_bh_wbc+0x133/0x7f0 [ 1091.117677][T31520] __sync_dirty_buffer+0x111/0x2e0 [ 1091.122879][T31520] sync_dirty_buffer+0x1b/0x20 [ 1091.127653][T31520] __ext4_handle_dirty_metadata+0x237/0x570 [ 1091.133645][T31520] ext4_getblk+0x32b/0x510 [ 1091.138252][T31520] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1091.143290][T31520] ? ext4_free_inode+0x1450/0x1450 [ 1091.148496][T31520] ext4_bread+0x8f/0x230 [ 1091.153090][T31520] ? ext4_getblk+0x510/0x510 [ 1091.157698][T31520] ext4_append+0x155/0x370 [ 1091.162209][T31520] ext4_mkdir+0x61b/0xdf0 [ 1091.166549][T31520] ? ext4_init_dot_dotdot+0x520/0x520 [ 1091.171952][T31520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.178212][T31520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.184566][T31520] ? security_inode_permission+0xd5/0x110 [ 1091.190301][T31520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.196918][T31520] ? security_inode_mkdir+0xee/0x120 [ 1091.202223][T31520] vfs_mkdir+0x433/0x690 [ 1091.206649][T31520] do_mkdirat+0x234/0x2a0 [ 1091.211004][T31520] ? __ia32_sys_mknod+0xb0/0xb0 [ 1091.215869][T31520] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1091.221357][T31520] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.227525][T31520] ? do_syscall_64+0x26/0x610 [ 1091.232218][T31520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1091.243104][T31520] __x64_sys_mkdir+0x5c/0x80 [ 1091.247712][T31520] do_syscall_64+0x103/0x610 [ 1091.252490][T31520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.258486][T31520] RIP: 0033:0x457627 [ 1091.262480][T31520] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1091.282367][T31520] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1091.290778][T31520] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1091.299017][T31520] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1091.307116][T31520] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1091.316052][T31520] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1091.324022][T31520] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}]}, 0x2c}}, 0x0) [ 1091.390769][T31517] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:31 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:31 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001feffffff4000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1091.594997][T31540] FAULT_INJECTION: forcing a failure. [ 1091.594997][T31540] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.615598][T31540] CPU: 0 PID: 31540 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1091.624938][T31540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.635012][T31540] Call Trace: [ 1091.638334][T31540] dump_stack+0x172/0x1f0 [ 1091.642723][T31540] should_fail.cold+0xa/0x15 [ 1091.647497][T31540] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1091.653309][T31540] ? kasan_check_read+0x11/0x20 [ 1091.658168][T31540] __should_failslab+0x121/0x190 [ 1091.663195][T31540] should_failslab+0x9/0x14 [ 1091.667708][T31540] kmem_cache_alloc+0x47/0x6f0 [ 1091.672473][T31540] ? ___might_sleep+0x163/0x280 [ 1091.677333][T31540] ? mempool_alloc+0x380/0x380 [ 1091.682096][T31540] mempool_alloc_slab+0x47/0x60 [ 1091.687039][T31540] mempool_alloc+0x16b/0x380 [ 1091.691907][T31540] ? mempool_destroy+0x40/0x40 [ 1091.696680][T31540] ? mark_held_locks+0xf0/0xf0 [ 1091.701455][T31540] ? __unlock_page_memcg+0x53/0x100 [ 1091.706651][T31540] ? find_held_lock+0x35/0x130 [ 1091.711425][T31540] bio_alloc_bioset+0x3bf/0x680 [ 1091.716379][T31540] ? bvec_alloc+0x2f0/0x2f0 [ 1091.720883][T31540] ? kasan_check_read+0x11/0x20 [ 1091.725746][T31540] submit_bh_wbc+0x133/0x7f0 [ 1091.730347][T31540] __sync_dirty_buffer+0x111/0x2e0 [ 1091.735550][T31540] sync_dirty_buffer+0x1b/0x20 [ 1091.740319][T31540] __ext4_handle_dirty_metadata+0x237/0x570 [ 1091.746409][T31540] ? add_dirent_to_buf+0x402/0x680 [ 1091.751530][T31540] ext4_handle_dirty_dirent_node+0x3cf/0x4f0 [ 1091.757601][T31540] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1091.763442][T31540] ? ext4_rename_dir_prepare+0x460/0x460 [ 1091.769431][T31540] ? current_time+0xd8/0x140 [ 1091.774027][T31540] ? timespec64_trunc+0x180/0x180 [ 1091.779054][T31540] ? ext4_insert_dentry+0x3c3/0x490 [ 1091.784261][T31540] add_dirent_to_buf+0x410/0x680 [ 1091.789211][T31540] ? ext4_insert_dentry+0x490/0x490 [ 1091.794515][T31540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.800759][T31540] ? __ext4_read_dirblock+0x3b1/0x980 [ 1091.806133][T31540] ? __ext4_journal_get_write_access+0x70/0xa0 [ 1091.812300][T31540] ext4_add_entry+0x52d/0xbd0 [ 1091.817002][T31540] ? make_indexed_dir+0x1310/0x1310 [ 1091.822214][T31540] ? memcpy+0x46/0x50 [ 1091.826318][T31540] ext4_mkdir+0x73f/0xdf0 [ 1091.830655][T31540] ? ext4_init_dot_dotdot+0x520/0x520 [ 1091.836028][T31540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.842654][T31540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.849271][T31540] ? security_inode_permission+0xd5/0x110 [ 1091.855079][T31540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.861319][T31540] ? security_inode_mkdir+0xee/0x120 [ 1091.866604][T31540] vfs_mkdir+0x433/0x690 [ 1091.870853][T31540] do_mkdirat+0x234/0x2a0 [ 1091.875186][T31540] ? __ia32_sys_mknod+0xb0/0xb0 [ 1091.880042][T31540] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1091.885509][T31540] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.891579][T31540] ? do_syscall_64+0x26/0x610 [ 1091.896412][T31540] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1091.901877][T31540] __x64_sys_mkdir+0x5c/0x80 [ 1091.906567][T31540] do_syscall_64+0x103/0x610 [ 1091.911172][T31540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.917065][T31540] RIP: 0033:0x457627 [ 1091.920963][T31540] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:54:31 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300]}, 0x63) 04:54:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}]}, 0x2c}}, 0x0) [ 1091.940650][T31540] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1091.949068][T31540] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1091.957055][T31540] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1091.965040][T31540] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1091.973025][T31540] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1091.981015][T31540] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}]}, 0x2c}}, 0x0) [ 1092.099829][T31550] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:31 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1092.200047][T31550] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:32 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000000100000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}]}, 0x2c}}, 0x0) [ 1092.292280][T31566] FAULT_INJECTION: forcing a failure. [ 1092.292280][T31566] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.365537][T31570] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1092.379157][T31566] CPU: 1 PID: 31566 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1092.388399][T31566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.398602][T31566] Call Trace: [ 1092.401916][T31566] dump_stack+0x172/0x1f0 [ 1092.406278][T31566] should_fail.cold+0xa/0x15 [ 1092.410893][T31566] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1092.416705][T31566] ? finish_task_switch+0x118/0x780 [ 1092.421909][T31566] ? __switch_to_asm+0x34/0x70 [ 1092.426676][T31566] ? __switch_to_asm+0x40/0x70 [ 1092.431452][T31566] __should_failslab+0x121/0x190 [ 1092.436392][T31566] should_failslab+0x9/0x14 [ 1092.440897][T31566] kmem_cache_alloc+0x47/0x6f0 [ 1092.445777][T31566] ? ___might_sleep+0x163/0x280 [ 1092.450636][T31566] ? mempool_alloc+0x380/0x380 [ 1092.455429][T31566] mempool_alloc_slab+0x47/0x60 [ 1092.460286][T31566] mempool_alloc+0x16b/0x380 [ 1092.464881][T31566] ? io_schedule+0x1c/0x70 [ 1092.469307][T31566] ? mempool_destroy+0x40/0x40 [ 1092.474073][T31566] ? mark_held_locks+0xf0/0xf0 [ 1092.478858][T31566] ? __unlock_page_memcg+0x53/0x100 [ 1092.484228][T31566] ? find_held_lock+0x35/0x130 [ 1092.488997][T31566] bio_alloc_bioset+0x3bf/0x680 [ 1092.494113][T31566] ? bvec_alloc+0x2f0/0x2f0 [ 1092.498636][T31566] ? kasan_check_read+0x11/0x20 [ 1092.503494][T31566] submit_bh_wbc+0x133/0x7f0 [ 1092.508107][T31566] __sync_dirty_buffer+0x111/0x2e0 [ 1092.513227][T31566] sync_dirty_buffer+0x1b/0x20 [ 1092.517999][T31566] __ext4_handle_dirty_metadata+0x237/0x570 [ 1092.523897][T31566] ext4_handle_dirty_dirent_node+0x3cf/0x4f0 [ 1092.529965][T31566] ? __might_sleep+0x95/0x190 [ 1092.534643][T31566] ? ext4_rename_dir_prepare+0x460/0x460 [ 1092.540293][T31566] ? memcpy+0x46/0x50 [ 1092.544278][T31566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.550526][T31566] ? ext4_init_dot_dotdot+0x39c/0x520 [ 1092.555984][T31566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.562244][T31566] ext4_mkdir+0x6c9/0xdf0 [ 1092.566672][T31566] ? ext4_init_dot_dotdot+0x520/0x520 [ 1092.572047][T31566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.578351][T31566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.584600][T31566] ? security_inode_permission+0xd5/0x110 [ 1092.590324][T31566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.596740][T31566] ? security_inode_mkdir+0xee/0x120 [ 1092.602025][T31566] vfs_mkdir+0x433/0x690 [ 1092.606274][T31566] do_mkdirat+0x234/0x2a0 [ 1092.610603][T31566] ? __ia32_sys_mknod+0xb0/0xb0 [ 1092.615453][T31566] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1092.621091][T31566] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.627163][T31566] ? do_syscall_64+0x26/0x610 [ 1092.631848][T31566] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1092.637308][T31566] __x64_sys_mkdir+0x5c/0x80 [ 1092.641899][T31566] do_syscall_64+0x103/0x610 [ 1092.646512][T31566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.652487][T31566] RIP: 0033:0x457627 [ 1092.656381][T31566] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1092.676072][T31566] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1092.684490][T31566] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1092.692462][T31566] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1092.700679][T31566] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1092.708651][T31566] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 04:54:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000003f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1092.716817][T31566] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1092.747781][T31570] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:32 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x500]}, 0x63) 04:54:32 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:32 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000000200000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edfffffff600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1092.989766][T31584] FAULT_INJECTION: forcing a failure. [ 1092.989766][T31584] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.039991][T31586] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1093.059913][T31584] CPU: 0 PID: 31584 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1093.069083][T31584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.079163][T31584] Call Trace: [ 1093.082477][T31584] dump_stack+0x172/0x1f0 04:54:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}]}, 0x2c}}, 0x0) 04:54:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edfffffdfc00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1093.086877][T31584] should_fail.cold+0xa/0x15 [ 1093.091479][T31584] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1093.097309][T31584] ? kasan_check_read+0x11/0x20 [ 1093.102392][T31584] __should_failslab+0x121/0x190 [ 1093.107347][T31584] should_failslab+0x9/0x14 [ 1093.112043][T31584] kmem_cache_alloc+0x47/0x6f0 [ 1093.116836][T31584] ? ___might_sleep+0x163/0x280 [ 1093.121707][T31584] ? mempool_alloc+0x380/0x380 [ 1093.126513][T31584] mempool_alloc_slab+0x47/0x60 [ 1093.131391][T31584] mempool_alloc+0x16b/0x380 [ 1093.136012][T31584] ? mempool_destroy+0x40/0x40 [ 1093.140808][T31584] ? mark_held_locks+0xf0/0xf0 [ 1093.145694][T31584] ? __unlock_page_memcg+0x53/0x100 [ 1093.150911][T31584] ? find_held_lock+0x35/0x130 [ 1093.155696][T31584] bio_alloc_bioset+0x3bf/0x680 [ 1093.160575][T31584] ? bvec_alloc+0x2f0/0x2f0 [ 1093.165094][T31584] ? kasan_check_read+0x11/0x20 [ 1093.169968][T31584] submit_bh_wbc+0x133/0x7f0 [ 1093.174583][T31584] __sync_dirty_buffer+0x111/0x2e0 [ 1093.180005][T31584] sync_dirty_buffer+0x1b/0x20 [ 1093.184776][T31584] __ext4_handle_dirty_metadata+0x237/0x570 [ 1093.190691][T31584] ? add_dirent_to_buf+0x402/0x680 [ 1093.195818][T31584] ext4_handle_dirty_dirent_node+0x3cf/0x4f0 [ 1093.202064][T31584] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1093.207805][T31584] ? ext4_rename_dir_prepare+0x460/0x460 [ 1093.213462][T31584] ? current_time+0xd8/0x140 [ 1093.218054][T31584] ? timespec64_trunc+0x180/0x180 [ 1093.223089][T31584] ? ext4_insert_dentry+0x3c3/0x490 [ 1093.228474][T31584] add_dirent_to_buf+0x410/0x680 [ 1093.238406][T31584] ? ext4_insert_dentry+0x490/0x490 [ 1093.243619][T31584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1093.249862][T31584] ? __ext4_read_dirblock+0x3b1/0x980 [ 1093.255240][T31584] ? __ext4_journal_get_write_access+0x70/0xa0 [ 1093.261424][T31584] ext4_add_entry+0x52d/0xbd0 [ 1093.266113][T31584] ? make_indexed_dir+0x1310/0x1310 [ 1093.271326][T31584] ? memcpy+0x46/0x50 [ 1093.275347][T31584] ext4_mkdir+0x73f/0xdf0 [ 1093.279688][T31584] ? ext4_init_dot_dotdot+0x520/0x520 [ 1093.285071][T31584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1093.292150][T31584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1093.298404][T31584] ? security_inode_permission+0xd5/0x110 [ 1093.304273][T31584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1093.310616][T31584] ? security_inode_mkdir+0xee/0x120 [ 1093.315912][T31584] vfs_mkdir+0x433/0x690 [ 1093.320258][T31584] do_mkdirat+0x234/0x2a0 [ 1093.324599][T31584] ? __ia32_sys_mknod+0xb0/0xb0 [ 1093.329537][T31584] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1093.335013][T31584] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:54:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edfffffffe00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1093.341177][T31584] ? do_syscall_64+0x26/0x610 [ 1093.345957][T31584] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1093.351440][T31584] __x64_sys_mkdir+0x5c/0x80 [ 1093.356227][T31584] do_syscall_64+0x103/0x610 [ 1093.360834][T31584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1093.366739][T31584] RIP: 0033:0x457627 [ 1093.370651][T31584] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1093.390523][T31584] RSP: 002b:00007feecb62ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1093.399148][T31584] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000457627 [ 1093.407318][T31584] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1093.415420][T31584] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1093.423420][T31584] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1093.431499][T31584] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edfcfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}]}, 0x2c}}, 0x0) [ 1093.512987][T31586] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:33 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:33 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000000900000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1093.756638][T31614] FAULT_INJECTION: forcing a failure. [ 1093.756638][T31614] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.776576][T31614] CPU: 1 PID: 31614 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1093.785759][T31614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.795829][T31614] Call Trace: [ 1093.799233][T31614] dump_stack+0x172/0x1f0 [ 1093.803586][T31614] should_fail.cold+0xa/0x15 [ 1093.808292][T31614] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1093.814203][T31614] ? ___might_sleep+0x163/0x280 [ 1093.819078][T31614] __should_failslab+0x121/0x190 [ 1093.824051][T31614] should_failslab+0x9/0x14 [ 1093.828655][T31614] __kmalloc_track_caller+0x2d8/0x740 [ 1093.834056][T31614] ? setup_sigcontext+0x7d0/0x7d0 [ 1093.839350][T31614] ? __bad_area_nosemaphore+0xb3/0x420 [ 1093.844812][T31614] ? strndup_user+0x77/0xd0 [ 1093.849350][T31614] memdup_user+0x26/0xb0 [ 1093.853604][T31614] strndup_user+0x77/0xd0 [ 1093.857940][T31614] ksys_mount+0x3c/0x150 [ 1093.862324][T31614] __x64_sys_mount+0xbe/0x150 [ 1093.867073][T31614] do_syscall_64+0x103/0x610 [ 1093.871692][T31614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1093.877594][T31614] RIP: 0033:0x45ac7a [ 1093.881500][T31614] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1093.901209][T31614] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1093.909631][T31614] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1093.917606][T31614] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1093.925696][T31614] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1093.933765][T31614] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1093.941743][T31614] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:33 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x600]}, 0x63) 04:54:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edf6ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}]}, 0x2c}}, 0x0) 04:54:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}]}, 0x2c}}, 0x0) 04:54:33 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1094.041920][T31616] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edfeffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000020000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1094.151192][T31616] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}]}, 0x2c}}, 0x0) 04:54:33 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000003600000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1094.294275][T31636] FAULT_INJECTION: forcing a failure. [ 1094.294275][T31636] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.329170][T31636] CPU: 1 PID: 31636 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1094.338327][T31636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.338340][T31636] Call Trace: [ 1094.354624][T31636] dump_stack+0x172/0x1f0 [ 1094.359005][T31636] should_fail.cold+0xa/0x15 [ 1094.363604][T31636] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1094.369430][T31636] ? ___might_sleep+0x163/0x280 [ 1094.374317][T31636] __should_failslab+0x121/0x190 [ 1094.379274][T31636] should_failslab+0x9/0x14 [ 1094.383779][T31636] __kmalloc_track_caller+0x2d8/0x740 [ 1094.389155][T31636] ? setup_sigcontext+0x7d0/0x7d0 [ 1094.394185][T31636] ? __bad_area_nosemaphore+0xb3/0x420 [ 1094.399644][T31636] ? strndup_user+0x77/0xd0 [ 1094.404346][T31636] memdup_user+0x26/0xb0 [ 1094.408820][T31636] strndup_user+0x77/0xd0 [ 1094.413152][T31636] ksys_mount+0x3c/0x150 [ 1094.417401][T31636] __x64_sys_mount+0xbe/0x150 [ 1094.422089][T31636] do_syscall_64+0x103/0x610 [ 1094.426704][T31636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1094.432601][T31636] RIP: 0033:0x45ac7a [ 1094.436499][T31636] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1094.456135][T31636] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1094.464557][T31636] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1094.472542][T31636] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1094.480605][T31636] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 04:54:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}}]}, 0x2c}}, 0x0) 04:54:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1094.488576][T31636] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1094.496550][T31636] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1094.565939][T31645] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1094.666930][T31645] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:34 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x700]}, 0x63) 04:54:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:34 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}]}, 0x2c}}, 0x0) 04:54:34 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000000003f00000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}]}, 0x2c}}, 0x0) 04:54:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1095.090397][T31663] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}}]}, 0x2c}}, 0x0) [ 1095.179821][T31663] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000002004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}]}, 0x2c}}, 0x0) [ 1095.284901][T31674] FAULT_INJECTION: forcing a failure. [ 1095.284901][T31674] name failslab, interval 1, probability 0, space 0, times 0 04:54:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1095.362242][T31674] CPU: 0 PID: 31674 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1095.388144][T31674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.398502][T31674] Call Trace: [ 1095.398535][T31674] dump_stack+0x172/0x1f0 [ 1095.398556][T31674] should_fail.cold+0xa/0x15 [ 1095.398578][T31674] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1095.417224][T31674] ? ___might_sleep+0x163/0x280 [ 1095.417245][T31674] __should_failslab+0x121/0x190 [ 1095.417262][T31674] should_failslab+0x9/0x14 [ 1095.417277][T31674] kmem_cache_alloc+0x2b2/0x6f0 [ 1095.417290][T31674] ? __schedule+0x81f/0x1cc0 [ 1095.417312][T31674] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1095.417331][T31674] getname_flags+0xd6/0x5b0 [ 1095.417353][T31674] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1095.457725][T31674] user_path_at_empty+0x2f/0x50 [ 1095.462768][T31674] do_mount+0x150/0x2c40 [ 1095.467033][T31674] ? retint_kernel+0x2d/0x2d [ 1095.471739][T31674] ? copy_mount_string+0x40/0x40 [ 1095.476704][T31674] ? copy_mount_options+0x1ea/0x3a0 [ 1095.481918][T31674] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 1095.487474][T31674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.493804][T31674] ? copy_mount_options+0x280/0x3a0 [ 1095.499028][T31674] ksys_mount+0xdb/0x150 [ 1095.503281][T31674] __x64_sys_mount+0xbe/0x150 [ 1095.507981][T31674] do_syscall_64+0x103/0x610 [ 1095.512584][T31674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1095.518498][T31674] RIP: 0033:0x45ac7a [ 1095.522398][T31674] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1095.542549][T31674] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1095.551150][T31674] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1095.559215][T31674] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1095.567194][T31674] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1095.575188][T31674] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1095.583267][T31674] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:35 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x900]}, 0x63) 04:54:35 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000200004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000003004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}]}, 0x2c}}, 0x0) 04:54:35 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1096.000077][T31700] FAULT_INJECTION: forcing a failure. [ 1096.000077][T31700] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.034524][T31703] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1096.068468][T31700] CPU: 0 PID: 31700 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1096.077638][T31700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.087846][T31700] Call Trace: [ 1096.091426][T31700] dump_stack+0x172/0x1f0 [ 1096.096092][T31700] should_fail.cold+0xa/0x15 [ 1096.100723][T31700] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1096.106567][T31700] ? ___might_sleep+0x163/0x280 [ 1096.111448][T31700] __should_failslab+0x121/0x190 [ 1096.116400][T31700] should_failslab+0x9/0x14 [ 1096.121012][T31700] kmem_cache_alloc+0x2b2/0x6f0 [ 1096.126144][T31700] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1096.131795][T31700] ? find_held_lock+0x35/0x130 [ 1096.136579][T31700] getname_flags+0xd6/0x5b0 [ 1096.141548][T31700] user_path_at_empty+0x2f/0x50 [ 1096.146495][T31700] do_mount+0x150/0x2c40 [ 1096.150761][T31700] ? copy_mount_options+0x5c/0x3a0 [ 1096.155979][T31700] ? copy_mount_string+0x40/0x40 [ 1096.161176][T31700] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1096.167450][T31700] ? _copy_from_user+0xdd/0x150 [ 1096.172592][T31700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1096.178853][T31700] ? copy_mount_options+0x280/0x3a0 [ 1096.184071][T31700] ksys_mount+0xdb/0x150 [ 1096.188329][T31700] __x64_sys_mount+0xbe/0x150 [ 1096.193143][T31700] do_syscall_64+0x103/0x610 [ 1096.197771][T31700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1096.203699][T31700] RIP: 0033:0x45ac7a [ 1096.207638][T31700] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1096.227450][T31700] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1096.235985][T31700] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1096.244227][T31700] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1096.252703][T31700] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1096.260781][T31700] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 04:54:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}}]}, 0x2c}}, 0x0) 04:54:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000004004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1096.268850][T31700] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:36 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000300004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:36 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x63) 04:54:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000006004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:36 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13000000]}}]}, 0x2c}}, 0x0) [ 1096.541683][T31720] FAULT_INJECTION: forcing a failure. [ 1096.541683][T31720] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1096.555551][T31720] CPU: 1 PID: 31720 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1096.564921][T31720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.574986][T31720] Call Trace: [ 1096.578295][T31720] dump_stack+0x172/0x1f0 [ 1096.582640][T31720] should_fail.cold+0xa/0x15 [ 1096.587256][T31720] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1096.593170][T31720] ? __lock_acquire+0x548/0x3fb0 [ 1096.598142][T31720] ? __save_stack_trace+0x99/0x100 [ 1096.603361][T31720] should_fail_alloc_page+0x50/0x60 [ 1096.608662][T31720] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1096.614134][T31720] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1096.619853][T31720] ? find_held_lock+0x35/0x130 [ 1096.624621][T31720] ? __x64_sys_mount+0xbe/0x150 [ 1096.629481][T31720] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1096.635309][T31720] cache_grow_begin+0x9c/0x860 [ 1096.640413][T31720] ? getname_flags+0xd6/0x5b0 [ 1096.645183][T31720] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1096.651534][T31720] kmem_cache_alloc+0x62d/0x6f0 [ 1096.656399][T31720] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1096.662032][T31720] ? find_held_lock+0x35/0x130 [ 1096.666982][T31720] getname_flags+0xd6/0x5b0 [ 1096.671502][T31720] user_path_at_empty+0x2f/0x50 [ 1096.676549][T31720] do_mount+0x150/0x2c40 [ 1096.680979][T31720] ? copy_mount_options+0x5c/0x3a0 [ 1096.686091][T31720] ? copy_mount_string+0x40/0x40 [ 1096.691033][T31720] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1096.697277][T31720] ? _copy_from_user+0xdd/0x150 [ 1096.702220][T31720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1096.708760][T31720] ? copy_mount_options+0x280/0x3a0 [ 1096.713977][T31720] ksys_mount+0xdb/0x150 [ 1096.718241][T31720] __x64_sys_mount+0xbe/0x150 [ 1096.722931][T31720] do_syscall_64+0x103/0x610 [ 1096.727560][T31720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1096.733585][T31720] RIP: 0033:0x45ac7a [ 1096.737499][T31720] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1096.757196][T31720] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1096.766138][T31720] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1096.774320][T31720] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1096.782471][T31720] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1096.801522][T31720] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1096.814616][T31720] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed000000000000003f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1096.846839][T31724] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:36 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21050000]}}]}, 0x2c}}, 0x0) [ 1096.980483][T31724] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000080004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1097.076292][T31741] FAULT_INJECTION: forcing a failure. [ 1097.076292][T31741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1097.089732][T31741] CPU: 0 PID: 31741 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1097.098856][T31741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.108929][T31741] Call Trace: [ 1097.112365][T31741] dump_stack+0x172/0x1f0 [ 1097.116838][T31741] should_fail.cold+0xa/0x15 04:54:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00000000fffffff6004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:36 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000400004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1097.121728][T31741] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1097.127760][T31741] ? __lock_acquire+0x548/0x3fb0 [ 1097.132719][T31741] ? __save_stack_trace+0x99/0x100 [ 1097.137861][T31741] should_fail_alloc_page+0x50/0x60 [ 1097.143076][T31741] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1097.148525][T31741] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1097.154341][T31741] ? find_held_lock+0x35/0x130 [ 1097.159125][T31741] ? __x64_sys_mount+0xbe/0x150 [ 1097.163994][T31741] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1097.169864][T31741] cache_grow_begin+0x9c/0x860 [ 1097.174755][T31741] ? getname_flags+0xd6/0x5b0 [ 1097.179642][T31741] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1097.186008][T31741] kmem_cache_alloc+0x62d/0x6f0 [ 1097.190886][T31741] ? kmem_cache_alloc_trace+0x5a4/0x760 [ 1097.196463][T31741] getname_flags+0xd6/0x5b0 [ 1097.201157][T31741] ? kasan_check_write+0x14/0x20 [ 1097.206130][T31741] user_path_at_empty+0x2f/0x50 [ 1097.211016][T31741] do_mount+0x150/0x2c40 [ 1097.215270][T31741] ? copy_mount_options+0x5c/0x3a0 [ 1097.220423][T31741] ? copy_mount_string+0x40/0x40 [ 1097.225504][T31741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1097.231759][T31741] ? copy_mount_options+0x280/0x3a0 [ 1097.242184][T31741] ksys_mount+0xdb/0x150 [ 1097.246458][T31741] __x64_sys_mount+0xbe/0x150 [ 1097.251166][T31741] do_syscall_64+0x103/0x610 [ 1097.255813][T31741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1097.261720][T31741] RIP: 0033:0x45ac7a [ 1097.265736][T31741] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1097.285943][T31741] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1097.294486][T31741] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1097.302476][T31741] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1097.310543][T31741] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1097.318845][T31741] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1097.326833][T31741] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:37 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x63) 04:54:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}]}, 0x2c}}, 0x0) 04:54:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00000000fffffdfc004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:37 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}]}, 0x2c}}, 0x0) 04:54:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00000000fffffffe004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1097.546094][T31757] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1097.622731][T31768] FAULT_INJECTION: forcing a failure. [ 1097.622731][T31768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1097.636078][T31768] CPU: 1 PID: 31768 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1097.645341][T31768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.655422][T31768] Call Trace: [ 1097.658740][T31768] dump_stack+0x172/0x1f0 [ 1097.663338][T31768] should_fail.cold+0xa/0x15 [ 1097.668031][T31768] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1097.673950][T31768] ? __lock_acquire+0x548/0x3fb0 [ 1097.679894][T31768] ? __save_stack_trace+0x99/0x100 [ 1097.685112][T31768] should_fail_alloc_page+0x50/0x60 [ 1097.690323][T31768] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1097.695705][T31768] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1097.701437][T31768] ? find_held_lock+0x35/0x130 [ 1097.706211][T31768] ? __x64_sys_mount+0xbe/0x150 [ 1097.711199][T31768] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1097.717113][T31768] cache_grow_begin+0x9c/0x860 [ 1097.721883][T31768] ? getname_flags+0xd6/0x5b0 [ 1097.726742][T31768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1097.733076][T31768] kmem_cache_alloc+0x62d/0x6f0 [ 1097.737933][T31768] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1097.743752][T31768] ? find_held_lock+0x35/0x130 [ 1097.748527][T31768] getname_flags+0xd6/0x5b0 [ 1097.753170][T31768] user_path_at_empty+0x2f/0x50 [ 1097.758133][T31768] do_mount+0x150/0x2c40 [ 1097.762380][T31768] ? copy_mount_options+0x5c/0x3a0 [ 1097.767710][T31768] ? copy_mount_string+0x40/0x40 [ 1097.772743][T31768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1097.779159][T31768] ? _copy_from_user+0xdd/0x150 [ 1097.784290][T31768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1097.790542][T31768] ? copy_mount_options+0x280/0x3a0 [ 1097.795745][T31768] ksys_mount+0xdb/0x150 [ 1097.799992][T31768] __x64_sys_mount+0xbe/0x150 [ 1097.804678][T31768] do_syscall_64+0x103/0x610 [ 1097.809557][T31768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1097.815465][T31768] RIP: 0033:0x45ac7a [ 1097.819615][T31768] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1097.839409][T31768] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1097.848524][T31768] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1097.856762][T31768] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1097.865096][T31768] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 04:54:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000]}}]}, 0x2c}}, 0x0) [ 1097.873434][T31768] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1097.881594][T31768] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00000000ffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1097.926470][T31757] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:37 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}}]}, 0x2c}}, 0x0) 04:54:37 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000500004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1098.152169][T31784] FAULT_INJECTION: forcing a failure. [ 1098.152169][T31784] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.197128][T31789] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1098.213071][T31784] CPU: 1 PID: 31784 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1098.222860][T31784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.233508][T31784] Call Trace: [ 1098.236886][T31784] dump_stack+0x172/0x1f0 [ 1098.241239][T31784] should_fail.cold+0xa/0x15 [ 1098.245867][T31784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1098.251690][T31784] ? ___might_sleep+0x163/0x280 [ 1098.256580][T31784] __should_failslab+0x121/0x190 [ 1098.261533][T31784] should_failslab+0x9/0x14 [ 1098.266394][T31784] kmem_cache_alloc_trace+0x2d1/0x760 [ 1098.271888][T31784] alloc_fs_context+0x5a/0x640 [ 1098.276661][T31784] fs_context_for_mount+0x25/0x30 [ 1098.281864][T31784] do_mount+0x13d7/0x2c40 [ 1098.286201][T31784] ? copy_mount_string+0x40/0x40 [ 1098.291737][T31784] ? _copy_from_user+0xdd/0x150 [ 1098.296611][T31784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1098.302858][T31784] ? copy_mount_options+0x280/0x3a0 [ 1098.308064][T31784] ksys_mount+0xdb/0x150 [ 1098.312311][T31784] __x64_sys_mount+0xbe/0x150 [ 1098.317104][T31784] do_syscall_64+0x103/0x610 [ 1098.321890][T31784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1098.328051][T31784] RIP: 0033:0x45ac7a [ 1098.332001][T31784] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1098.351806][T31784] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1098.360331][T31784] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1098.368310][T31784] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1098.376291][T31784] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1098.384264][T31784] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1098.392239][T31784] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1098.447862][T31789] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:38 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x63) 04:54:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0edffffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}}]}, 0x2c}}, 0x0) 04:54:38 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:38 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000600004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0002000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff]}}]}, 0x2c}}, 0x0) 04:54:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1098.675135][T31803] FAULT_INJECTION: forcing a failure. [ 1098.675135][T31803] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.709844][T31811] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1098.742200][T31803] CPU: 1 PID: 31803 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1098.751382][T31803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.761626][T31803] Call Trace: [ 1098.764956][T31803] dump_stack+0x172/0x1f0 [ 1098.769306][T31803] should_fail.cold+0xa/0x15 [ 1098.773920][T31803] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1098.779788][T31803] ? ___might_sleep+0x163/0x280 [ 1098.784674][T31803] __should_failslab+0x121/0x190 [ 1098.789719][T31803] should_failslab+0x9/0x14 [ 1098.794229][T31803] kmem_cache_alloc_trace+0x2d1/0x760 [ 1098.799612][T31803] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1098.805518][T31803] ? rcu_read_lock_sched_held+0x110/0x130 [ 1098.811271][T31803] ? kmem_cache_alloc_trace+0x354/0x760 [ 1098.816934][T31803] legacy_init_fs_context+0x48/0xe0 [ 1098.822140][T31803] ? generic_parse_monolithic+0x200/0x200 [ 1098.827868][T31803] alloc_fs_context+0x365/0x640 [ 1098.833047][T31803] fs_context_for_mount+0x25/0x30 [ 1098.838102][T31803] do_mount+0x13d7/0x2c40 [ 1098.842448][T31803] ? copy_mount_string+0x40/0x40 [ 1098.847414][T31803] ? _copy_from_user+0xdd/0x150 [ 1098.852279][T31803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1098.858617][T31803] ? copy_mount_options+0x280/0x3a0 [ 1098.863823][T31803] ksys_mount+0xdb/0x150 [ 1098.868091][T31803] __x64_sys_mount+0xbe/0x150 [ 1098.872872][T31803] do_syscall_64+0x103/0x610 [ 1098.877473][T31803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1098.883390][T31803] RIP: 0033:0x45ac7a [ 1098.887286][T31803] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1098.908329][T31803] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1098.916752][T31803] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1098.924723][T31803] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1098.932696][T31803] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 04:54:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff]}}]}, 0x2c}}, 0x0) [ 1098.940681][T31803] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1098.948753][T31803] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0004000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:39 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xd00]}, 0x63) 04:54:39 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000700004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:39 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}}]}, 0x2c}}, 0x0) 04:54:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1099.568337][T31832] FAULT_INJECTION: forcing a failure. [ 1099.568337][T31832] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.637515][T31832] CPU: 0 PID: 31832 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1099.646857][T31832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.656923][T31832] Call Trace: [ 1099.660232][T31832] dump_stack+0x172/0x1f0 [ 1099.664676][T31832] should_fail.cold+0xa/0x15 [ 1099.669282][T31832] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1099.675227][T31832] ? ___might_sleep+0x163/0x280 [ 1099.680122][T31832] __should_failslab+0x121/0x190 [ 1099.685088][T31832] should_failslab+0x9/0x14 [ 1099.689613][T31832] __kmalloc_track_caller+0x2d8/0x740 [ 1099.694987][T31832] ? kasan_kmalloc+0x9/0x10 [ 1099.699746][T31832] ? kmem_cache_alloc_trace+0x151/0x760 [ 1099.705395][T31832] ? legacy_init_fs_context+0x48/0xe0 [ 1099.710849][T31832] ? alloc_fs_context+0x365/0x640 [ 1099.715866][T31832] ? fs_context_for_mount+0x25/0x30 [ 1099.721117][T31832] ? do_mount+0x13d7/0x2c40 [ 1099.725788][T31832] ? ksys_mount+0xdb/0x150 [ 1099.730207][T31832] ? btrfs_mount+0xdc/0x15e2 [ 1099.734806][T31832] kstrdup+0x3a/0x70 [ 1099.738701][T31832] ? btrfs_remount+0x11f0/0x11f0 [ 1099.743630][T31832] btrfs_mount+0xdc/0x15e2 [ 1099.748136][T31832] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1099.753780][T31832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1099.760014][T31832] ? should_fail+0x1de/0x852 [ 1099.764604][T31832] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1099.770432][T31832] ? btrfs_remount+0x11f0/0x11f0 [ 1099.775393][T31832] ? rcu_read_lock_sched_held+0x110/0x130 [ 1099.781152][T31832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1099.787408][T31832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1099.793653][T31832] ? vfs_parse_fs_string+0x111/0x170 [ 1099.798937][T31832] ? vfs_parse_fs_string+0x111/0x170 [ 1099.804249][T31832] ? rcu_read_lock_sched_held+0x110/0x130 [ 1099.810063][T31832] ? kfree+0x1fa/0x230 [ 1099.814130][T31832] ? vfs_parse_fs_string+0x116/0x170 [ 1099.819415][T31832] ? btrfs_remount+0x11f0/0x11f0 [ 1099.824367][T31832] legacy_get_tree+0xf2/0x200 [ 1099.829050][T31832] ? btrfs_remount+0x11f0/0x11f0 [ 1099.833990][T31832] ? legacy_get_tree+0xf2/0x200 [ 1099.838839][T31832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1099.845079][T31832] vfs_get_tree+0x123/0x450 [ 1099.849667][T31832] do_mount+0x1436/0x2c40 [ 1099.853994][T31832] ? retint_kernel+0x2d/0x2d [ 1099.858597][T31832] ? copy_mount_string+0x40/0x40 [ 1099.863617][T31832] ? copy_mount_options+0x208/0x3a0 [ 1099.868899][T31832] ? write_comp_data+0x68/0x70 [ 1099.873658][T31832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1099.879977][T31832] ? copy_mount_options+0x280/0x3a0 [ 1099.885182][T31832] ksys_mount+0xdb/0x150 [ 1099.889435][T31832] __x64_sys_mount+0xbe/0x150 [ 1099.894135][T31832] do_syscall_64+0x103/0x610 [ 1099.898876][T31832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.904764][T31832] RIP: 0033:0x45ac7a [ 1099.908662][T31832] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1099.928525][T31832] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:54:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000030000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1099.937009][T31832] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1099.944979][T31832] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1099.953030][T31832] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1099.961176][T31832] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1099.969709][T31832] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}}]}, 0x2c}}, 0x0) [ 1099.981396][T31840] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000060000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:39 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000800004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:39 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1100.244166][T31853] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1100.278005][T31857] FAULT_INJECTION: forcing a failure. [ 1100.278005][T31857] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.297347][T31857] CPU: 0 PID: 31857 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1100.306862][T31857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.317971][T31857] Call Trace: [ 1100.322432][T31857] dump_stack+0x172/0x1f0 [ 1100.327919][T31857] should_fail.cold+0xa/0x15 [ 1100.332631][T31857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1100.338466][T31857] ? ___might_sleep+0x163/0x280 [ 1100.343447][T31857] __should_failslab+0x121/0x190 [ 1100.348752][T31857] should_failslab+0x9/0x14 [ 1100.353586][T31857] __kmalloc_track_caller+0x2d8/0x740 [ 1100.359254][T31857] ? vfs_parse_fs_string+0xe8/0x170 [ 1100.364565][T31857] kmemdup_nul+0x31/0xa0 [ 1100.368842][T31857] vfs_parse_fs_string+0xe8/0x170 [ 1100.373990][T31857] ? vfs_parse_fs_param+0x510/0x510 [ 1100.379394][T31857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.385827][T31857] ? alloc_fs_context+0x3bb/0x640 [ 1100.391320][T31857] do_mount+0x6e9/0x2c40 [ 1100.395671][T31857] ? copy_mount_string+0x40/0x40 [ 1100.400745][T31857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.409786][T31857] ? copy_mount_options+0x280/0x3a0 [ 1100.414996][T31857] ksys_mount+0xdb/0x150 [ 1100.419243][T31857] __x64_sys_mount+0xbe/0x150 [ 1100.424016][T31857] do_syscall_64+0x103/0x610 [ 1100.428714][T31857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.434625][T31857] RIP: 0033:0x45ac7a [ 1100.438520][T31857] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1100.458553][T31857] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1100.468017][T31857] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1100.478084][T31857] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1100.486500][T31857] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1100.494666][T31857] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1100.502729][T31857] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1100.539882][T31853] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:40 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x63) 04:54:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}]}, 0x2c}}, 0x0) 04:54:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00003f0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:40 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:40 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000900004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1100.943944][T31871] FAULT_INJECTION: forcing a failure. [ 1100.943944][T31871] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.963877][T31871] CPU: 0 PID: 31871 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1100.973029][T31871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.976024][T31874] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1100.983185][T31871] Call Trace: [ 1100.983217][T31871] dump_stack+0x172/0x1f0 [ 1100.983241][T31871] should_fail.cold+0xa/0x15 [ 1100.983260][T31871] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1100.983277][T31871] ? ___might_sleep+0x163/0x280 [ 1100.983293][T31871] __should_failslab+0x121/0x190 [ 1100.983308][T31871] should_failslab+0x9/0x14 [ 1100.983320][T31871] __kmalloc_track_caller+0x2d8/0x740 [ 1100.983331][T31871] ? kasan_kmalloc+0x9/0x10 [ 1100.983341][T31871] ? kmem_cache_alloc_trace+0x151/0x760 [ 1100.983355][T31871] ? legacy_init_fs_context+0x48/0xe0 [ 1100.983367][T31871] ? alloc_fs_context+0x365/0x640 [ 1100.983387][T31871] ? fs_context_for_mount+0x25/0x30 [ 1101.055490][T31871] ? do_mount+0x13d7/0x2c40 [ 1101.060039][T31871] ? ksys_mount+0xdb/0x150 [ 1101.064487][T31871] ? btrfs_mount+0xdc/0x15e2 [ 1101.069186][T31871] kstrdup+0x3a/0x70 [ 1101.073107][T31871] ? btrfs_remount+0x11f0/0x11f0 [ 1101.078074][T31871] btrfs_mount+0xdc/0x15e2 [ 1101.082598][T31871] ? find_held_lock+0x35/0x130 [ 1101.087383][T31871] ? __kmalloc_track_caller+0x577/0x740 [ 1101.094008][T31871] ? lock_downgrade+0x880/0x880 [ 1101.099006][T31871] ? btrfs_remount+0x11f0/0x11f0 [ 1101.103974][T31871] ? rcu_read_lock_sched_held+0x110/0x130 [ 1101.109713][T31871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.115994][T31871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.122259][T31871] ? vfs_parse_fs_string+0x111/0x170 [ 1101.127563][T31871] ? vfs_parse_fs_string+0x111/0x170 [ 1101.132862][T31871] ? rcu_read_lock_sched_held+0x110/0x130 [ 1101.138617][T31871] ? kfree+0x1fa/0x230 04:54:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e]}}]}, 0x2c}}, 0x0) 04:54:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000001000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1101.142701][T31871] ? vfs_parse_fs_string+0x116/0x170 [ 1101.148000][T31871] ? btrfs_remount+0x11f0/0x11f0 [ 1101.153033][T31871] legacy_get_tree+0xf2/0x200 [ 1101.157905][T31871] ? btrfs_remount+0x11f0/0x11f0 [ 1101.162866][T31871] ? legacy_get_tree+0xf2/0x200 [ 1101.167739][T31871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.173995][T31871] vfs_get_tree+0x123/0x450 [ 1101.178645][T31871] do_mount+0x1436/0x2c40 [ 1101.183000][T31871] ? copy_mount_string+0x40/0x40 [ 1101.187968][T31871] ? copy_mount_options+0x198/0x3a0 [ 1101.193680][T31871] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1101.199257][T31871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.205513][T31871] ? copy_mount_options+0x280/0x3a0 [ 1101.210729][T31871] ksys_mount+0xdb/0x150 [ 1101.215117][T31871] __x64_sys_mount+0xbe/0x150 [ 1101.219812][T31871] do_syscall_64+0x103/0x610 [ 1101.224421][T31871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.230317][T31871] RIP: 0033:0x45ac7a [ 1101.239420][T31871] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1101.259397][T31871] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1101.267957][T31871] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1101.275945][T31871] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1101.284033][T31871] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 04:54:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000002000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1101.292023][T31871] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1101.301060][T31871] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000003000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:41 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1101.385158][T31874] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1101.536585][T31893] FAULT_INJECTION: forcing a failure. [ 1101.536585][T31893] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.551102][T31893] CPU: 1 PID: 31893 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1101.560772][T31893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.571281][T31893] Call Trace: [ 1101.574590][T31893] dump_stack+0x172/0x1f0 [ 1101.579017][T31893] should_fail.cold+0xa/0x15 [ 1101.583706][T31893] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1101.589558][T31893] ? ___might_sleep+0x163/0x280 [ 1101.594420][T31893] __should_failslab+0x121/0x190 [ 1101.599385][T31893] should_failslab+0x9/0x14 [ 1101.604066][T31893] kmem_cache_alloc_node_trace+0x270/0x720 [ 1101.610067][T31893] __kmalloc_node+0x3d/0x70 [ 1101.614668][T31893] kvmalloc_node+0xbd/0x100 [ 1101.619196][T31893] btrfs_mount_root+0x12b/0x1220 [ 1101.624351][T31893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.630692][T31893] ? btrfs_decode_error+0x70/0x70 [ 1101.635719][T31893] ? rcu_read_lock_sched_held+0x110/0x130 [ 1101.641535][T31893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.647860][T31893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.654279][T31893] ? vfs_parse_fs_string+0x111/0x170 [ 1101.659567][T31893] ? vfs_parse_fs_string+0x111/0x170 [ 1101.664852][T31893] ? rcu_read_lock_sched_held+0x110/0x130 [ 1101.670744][T31893] ? kfree+0x1fa/0x230 [ 1101.675248][T31893] ? vfs_parse_fs_string+0x116/0x170 [ 1101.680541][T31893] ? btrfs_decode_error+0x70/0x70 [ 1101.685570][T31893] legacy_get_tree+0xf2/0x200 [ 1101.690345][T31893] vfs_get_tree+0x123/0x450 [ 1101.694947][T31893] fc_mount+0x17/0xc0 [ 1101.699021][T31893] vfs_kern_mount.part.0+0xd8/0xf0 [ 1101.704222][T31893] vfs_kern_mount+0x40/0x60 [ 1101.708728][T31893] btrfs_mount+0x2b4/0x15e2 [ 1101.713235][T31893] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1101.719038][T31893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.725282][T31893] ? should_fail+0x1de/0x852 [ 1101.729963][T31893] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1101.736130][T31893] ? btrfs_remount+0x11f0/0x11f0 [ 1101.741422][T31893] ? rcu_read_lock_sched_held+0x110/0x130 [ 1101.747230][T31893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.754261][T31893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.760594][T31893] ? vfs_parse_fs_string+0x111/0x170 [ 1101.765972][T31893] ? vfs_parse_fs_string+0x111/0x170 [ 1101.771260][T31893] ? rcu_read_lock_sched_held+0x110/0x130 [ 1101.776979][T31893] ? kfree+0x1fa/0x230 [ 1101.781048][T31893] ? vfs_parse_fs_string+0x116/0x170 [ 1101.786532][T31893] ? btrfs_remount+0x11f0/0x11f0 [ 1101.791697][T31893] legacy_get_tree+0xf2/0x200 [ 1101.796461][T31893] ? btrfs_remount+0x11f0/0x11f0 [ 1101.801492][T31893] ? legacy_get_tree+0xf2/0x200 [ 1101.806342][T31893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.812863][T31893] vfs_get_tree+0x123/0x450 [ 1101.817378][T31893] do_mount+0x1436/0x2c40 [ 1101.821810][T31893] ? copy_mount_string+0x40/0x40 [ 1101.826754][T31893] ? _copy_from_user+0xdd/0x150 [ 1101.831693][T31893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.838019][T31893] ? copy_mount_options+0x280/0x3a0 [ 1101.843223][T31893] ksys_mount+0xdb/0x150 [ 1101.847556][T31893] __x64_sys_mount+0xbe/0x150 [ 1101.852236][T31893] do_syscall_64+0x103/0x610 [ 1101.857008][T31893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.862896][T31893] RIP: 0033:0x45ac7a [ 1101.866803][T31893] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1101.886842][T31893] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1101.895428][T31893] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1101.903487][T31893] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1101.911470][T31893] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1101.919438][T31893] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1101.927431][T31893] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:41 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x63) 04:54:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0]}}]}, 0x2c}}, 0x0) 04:54:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:41 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000a00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000004000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:41 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}]}, 0x2c}}, 0x0) 04:54:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000006000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1102.102061][T31901] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1102.222145][T31910] FAULT_INJECTION: forcing a failure. [ 1102.222145][T31910] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.257825][T31910] CPU: 1 PID: 31910 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1102.267336][T31910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.277567][T31910] Call Trace: [ 1102.280880][T31910] dump_stack+0x172/0x1f0 [ 1102.285218][T31910] should_fail.cold+0xa/0x15 [ 1102.289826][T31910] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1102.295646][T31910] ? ___might_sleep+0x163/0x280 [ 1102.300507][T31910] __should_failslab+0x121/0x190 [ 1102.305448][T31910] should_failslab+0x9/0x14 [ 1102.309951][T31910] kmem_cache_alloc_node_trace+0x270/0x720 [ 1102.315854][T31910] __kmalloc_node+0x3d/0x70 [ 1102.320478][T31910] kvmalloc_node+0xbd/0x100 [ 1102.324984][T31910] btrfs_mount_root+0x12b/0x1220 [ 1102.330035][T31910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.336424][T31910] ? btrfs_decode_error+0x70/0x70 [ 1102.341452][T31910] ? rcu_read_lock_sched_held+0x110/0x130 [ 1102.347167][T31910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.353663][T31910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.359908][T31910] ? vfs_parse_fs_string+0x111/0x170 [ 1102.365194][T31910] ? vfs_parse_fs_string+0x111/0x170 [ 1102.370481][T31910] ? rcu_read_lock_sched_held+0x110/0x130 [ 1102.376198][T31910] ? kfree+0x1fa/0x230 [ 1102.380286][T31910] ? vfs_parse_fs_string+0x116/0x170 [ 1102.385678][T31910] ? btrfs_decode_error+0x70/0x70 [ 1102.390705][T31910] legacy_get_tree+0xf2/0x200 [ 1102.395417][T31910] vfs_get_tree+0x123/0x450 [ 1102.399926][T31910] fc_mount+0x17/0xc0 [ 1102.403997][T31910] vfs_kern_mount.part.0+0xd8/0xf0 [ 1102.409120][T31910] vfs_kern_mount+0x40/0x60 [ 1102.413648][T31910] btrfs_mount+0x2b4/0x15e2 [ 1102.418172][T31910] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1102.423977][T31910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.430489][T31910] ? should_fail+0x1de/0x852 [ 1102.435081][T31910] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1102.440899][T31910] ? btrfs_remount+0x11f0/0x11f0 [ 1102.445843][T31910] ? rcu_read_lock_sched_held+0x110/0x130 [ 1102.451836][T31910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.458086][T31910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.464329][T31910] ? vfs_parse_fs_string+0x111/0x170 [ 1102.469614][T31910] ? vfs_parse_fs_string+0x111/0x170 [ 1102.475103][T31910] ? rcu_read_lock_sched_held+0x110/0x130 [ 1102.480821][T31910] ? kfree+0x1fa/0x230 [ 1102.484895][T31910] ? vfs_parse_fs_string+0x116/0x170 [ 1102.490373][T31910] ? btrfs_remount+0x11f0/0x11f0 [ 1102.495579][T31910] legacy_get_tree+0xf2/0x200 [ 1102.500366][T31910] ? btrfs_remount+0x11f0/0x11f0 [ 1102.505478][T31910] ? legacy_get_tree+0xf2/0x200 [ 1102.510331][T31910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.516835][T31910] vfs_get_tree+0x123/0x450 [ 1102.521350][T31910] do_mount+0x1436/0x2c40 [ 1102.526117][T31910] ? copy_mount_string+0x40/0x40 [ 1102.531147][T31910] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 1102.538254][T31910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.544579][T31910] ? copy_mount_options+0x280/0x3a0 [ 1102.549828][T31910] ksys_mount+0xdb/0x150 [ 1102.554076][T31910] __x64_sys_mount+0xbe/0x150 [ 1102.558758][T31910] do_syscall_64+0x103/0x610 [ 1102.563360][T31910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.569344][T31910] RIP: 0033:0x45ac7a [ 1102.573264][T31910] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1102.592965][T31910] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1102.601477][T31910] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1102.609539][T31910] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 04:54:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}]}, 0x2c}}, 0x0) 04:54:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed000000003f000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1102.617766][T31910] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1102.625743][T31910] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1102.633708][T31910] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1102.655902][T31901] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:42 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001002300004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1102.889426][T31926] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1102.976441][T31926] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:42 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x63) 04:54:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}]}, 0x2c}}, 0x0) 04:54:42 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00fffffff6000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:42 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001002d00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}]}, 0x2c}}, 0x0) [ 1103.132163][T31934] FAULT_INJECTION: forcing a failure. [ 1103.132163][T31934] name failslab, interval 1, probability 0, space 0, times 0 04:54:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00fffffdfc000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1103.180309][T31934] CPU: 0 PID: 31934 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1103.189640][T31934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.199783][T31934] Call Trace: [ 1103.199812][T31934] dump_stack+0x172/0x1f0 [ 1103.199837][T31934] should_fail.cold+0xa/0x15 [ 1103.212055][T31934] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1103.217898][T31934] ? ___might_sleep+0x163/0x280 [ 1103.222959][T31934] __should_failslab+0x121/0x190 [ 1103.228042][T31934] should_failslab+0x9/0x14 [ 1103.237323][T31934] kmem_cache_alloc_node_trace+0x270/0x720 [ 1103.237345][T31934] __kmalloc_node+0x3d/0x70 [ 1103.237360][T31934] kvmalloc_node+0xbd/0x100 [ 1103.237380][T31934] btrfs_mount_root+0x12b/0x1220 [ 1103.237399][T31934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.237417][T31934] ? btrfs_decode_error+0x70/0x70 [ 1103.237434][T31934] ? rcu_read_lock_sched_held+0x110/0x130 [ 1103.237445][T31934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.237457][T31934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.237476][T31934] ? vfs_parse_fs_string+0x111/0x170 [ 1103.237497][T31934] ? vfs_parse_fs_string+0x111/0x170 [ 1103.298358][T31934] ? rcu_read_lock_sched_held+0x110/0x130 [ 1103.304108][T31934] ? kfree+0x1fa/0x230 [ 1103.308209][T31934] ? vfs_parse_fs_string+0x116/0x170 [ 1103.313523][T31934] ? btrfs_decode_error+0x70/0x70 [ 1103.313543][T31934] legacy_get_tree+0xf2/0x200 [ 1103.313562][T31934] vfs_get_tree+0x123/0x450 [ 1103.313583][T31934] fc_mount+0x17/0xc0 [ 1103.313600][T31934] vfs_kern_mount.part.0+0xd8/0xf0 [ 1103.313617][T31934] vfs_kern_mount+0x40/0x60 [ 1103.313632][T31934] btrfs_mount+0x2b4/0x15e2 [ 1103.313649][T31934] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1103.313665][T31934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.313678][T31934] ? should_fail+0x1de/0x852 [ 1103.313699][T31934] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1103.328339][T31934] ? btrfs_remount+0x11f0/0x11f0 [ 1103.328369][T31934] ? rcu_read_lock_sched_held+0x110/0x130 [ 1103.328387][T31934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.328401][T31934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.328420][T31934] ? vfs_parse_fs_string+0x111/0x170 [ 1103.328433][T31934] ? vfs_parse_fs_string+0x111/0x170 [ 1103.328445][T31934] ? rcu_read_lock_sched_held+0x110/0x130 [ 1103.328459][T31934] ? kfree+0x1fa/0x230 [ 1103.328475][T31934] ? vfs_parse_fs_string+0x116/0x170 [ 1103.328491][T31934] ? btrfs_remount+0x11f0/0x11f0 [ 1103.328503][T31934] legacy_get_tree+0xf2/0x200 [ 1103.328515][T31934] ? btrfs_remount+0x11f0/0x11f0 [ 1103.328525][T31934] ? legacy_get_tree+0xf2/0x200 [ 1103.328542][T31934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.337633][T31934] vfs_get_tree+0x123/0x450 [ 1103.352318][T31934] do_mount+0x1436/0x2c40 [ 1103.352342][T31934] ? copy_mount_string+0x40/0x40 [ 1103.352369][T31934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.352382][T31934] ? copy_mount_options+0x280/0x3a0 [ 1103.352399][T31934] ksys_mount+0xdb/0x150 [ 1103.352411][T31934] __x64_sys_mount+0xbe/0x150 [ 1103.352431][T31934] do_syscall_64+0x103/0x610 [ 1103.352454][T31934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.352465][T31934] RIP: 0033:0x45ac7a [ 1103.352479][T31934] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1103.352487][T31934] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1103.352499][T31934] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a 04:54:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00fffffffe000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1103.352508][T31934] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1103.352516][T31934] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1103.352524][T31934] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1103.352537][T31934] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:43 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}]}, 0x2c}}, 0x0) [ 1103.612365][T31947] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00fcfdffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1103.724850][T31947] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1103.806005][T31962] FAULT_INJECTION: forcing a failure. [ 1103.806005][T31962] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1103.819545][T31962] CPU: 1 PID: 31962 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1103.829044][T31962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.840500][T31962] Call Trace: [ 1103.843814][T31962] dump_stack+0x172/0x1f0 [ 1103.848203][T31962] should_fail.cold+0xa/0x15 [ 1103.852818][T31962] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1103.858721][T31962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1103.864543][T31962] ? __lock_acquire+0x548/0x3fb0 [ 1103.869574][T31962] ? legacy_get_tree+0xf2/0x200 [ 1103.874454][T31962] ? vfs_get_tree+0x123/0x450 [ 1103.879127][T31962] ? do_mount+0x1436/0x2c40 [ 1103.883630][T31962] ? ksys_mount+0xdb/0x150 [ 1103.888165][T31962] should_fail_alloc_page+0x50/0x60 [ 1103.893363][T31962] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1103.898766][T31962] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1103.904486][T31962] ? find_held_lock+0x35/0x130 [ 1103.909269][T31962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1103.915081][T31962] cache_grow_begin+0x9c/0x860 [ 1103.919850][T31962] ? btrfs_mount_root+0x174/0x1220 [ 1103.924973][T31962] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1103.931226][T31962] kmem_cache_alloc_trace+0x67f/0x760 [ 1103.936599][T31962] ? kasan_kmalloc+0x9/0x10 [ 1103.941112][T31962] btrfs_mount_root+0x174/0x1220 [ 1103.946315][T31962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.952673][T31962] ? btrfs_decode_error+0x70/0x70 [ 1103.957812][T31962] ? rcu_read_lock_sched_held+0x110/0x130 [ 1103.963529][T31962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.969800][T31962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1103.976047][T31962] ? vfs_parse_fs_string+0x111/0x170 [ 1103.981329][T31962] ? vfs_parse_fs_string+0x111/0x170 [ 1103.986610][T31962] ? rcu_read_lock_sched_held+0x110/0x130 [ 1103.992587][T31962] ? kfree+0x1fa/0x230 [ 1103.996661][T31962] ? vfs_parse_fs_string+0x116/0x170 [ 1104.001961][T31962] ? btrfs_decode_error+0x70/0x70 [ 1104.007445][T31962] legacy_get_tree+0xf2/0x200 [ 1104.012127][T31962] vfs_get_tree+0x123/0x450 [ 1104.016852][T31962] fc_mount+0x17/0xc0 [ 1104.020950][T31962] vfs_kern_mount.part.0+0xd8/0xf0 [ 1104.026071][T31962] vfs_kern_mount+0x40/0x60 [ 1104.030666][T31962] btrfs_mount+0x2b4/0x15e2 [ 1104.035274][T31962] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1104.040923][T31962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.047192][T31962] ? should_fail+0x1de/0x852 [ 1104.051859][T31962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1104.057688][T31962] ? btrfs_remount+0x11f0/0x11f0 [ 1104.062750][T31962] ? rcu_read_lock_sched_held+0x110/0x130 [ 1104.068479][T31962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.074720][T31962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.081092][T31962] ? vfs_parse_fs_string+0x111/0x170 [ 1104.087016][T31962] ? vfs_parse_fs_string+0x111/0x170 [ 1104.092327][T31962] ? rcu_read_lock_sched_held+0x110/0x130 [ 1104.098137][T31962] ? kfree+0x1fa/0x230 [ 1104.102343][T31962] ? vfs_parse_fs_string+0x116/0x170 [ 1104.107630][T31962] ? btrfs_remount+0x11f0/0x11f0 [ 1104.112568][T31962] legacy_get_tree+0xf2/0x200 [ 1104.117415][T31962] ? btrfs_remount+0x11f0/0x11f0 [ 1104.122441][T31962] ? legacy_get_tree+0xf2/0x200 [ 1104.127310][T31962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.133755][T31962] vfs_get_tree+0x123/0x450 [ 1104.138349][T31962] do_mount+0x1436/0x2c40 [ 1104.142684][T31962] ? copy_mount_string+0x40/0x40 [ 1104.147721][T31962] ? _copy_from_user+0xdd/0x150 [ 1104.152577][T31962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.158813][T31962] ? copy_mount_options+0x280/0x3a0 [ 1104.164025][T31962] ksys_mount+0xdb/0x150 [ 1104.168355][T31962] __x64_sys_mount+0xbe/0x150 [ 1104.173040][T31962] do_syscall_64+0x103/0x610 [ 1104.177644][T31962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1104.183534][T31962] RIP: 0033:0x45ac7a [ 1104.187601][T31962] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1104.207203][T31962] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1104.215617][T31962] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1104.223588][T31962] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1104.232121][T31962] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1104.240202][T31962] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1104.248172][T31962] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:44 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001004800004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:44 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1200]}, 0x63) 04:54:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs ', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00f6ffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}]}, 0x2c}}, 0x0) 04:54:44 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00feffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}]}, 0x2c}}, 0x0) [ 1104.453154][T31977] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1104.512918][T31977] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1104.547605][T31987] FAULT_INJECTION: forcing a failure. [ 1104.547605][T31987] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.568440][T31987] CPU: 0 PID: 31987 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1104.577792][T31987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.588043][T31987] Call Trace: [ 1104.591358][T31987] dump_stack+0x172/0x1f0 [ 1104.595887][T31987] should_fail.cold+0xa/0x15 [ 1104.600492][T31987] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1104.606313][T31987] ? ___might_sleep+0x163/0x280 [ 1104.611184][T31987] __should_failslab+0x121/0x190 [ 1104.616145][T31987] should_failslab+0x9/0x14 [ 1104.620662][T31987] kmem_cache_alloc+0x2b2/0x6f0 [ 1104.625515][T31987] ? fc_mount+0x17/0xc0 [ 1104.629687][T31987] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 1104.634983][T31987] ? vfs_kern_mount+0x40/0x60 [ 1104.639943][T31987] ? btrfs_mount+0x2b4/0x15e2 [ 1104.644621][T31987] ? legacy_get_tree+0xf2/0x200 [ 1104.649468][T31987] ? vfs_get_tree+0x123/0x450 [ 1104.654249][T31987] ? do_mount+0x1436/0x2c40 [ 1104.659127][T31987] ? ksys_mount+0xdb/0x150 [ 1104.663582][T31987] getname_kernel+0x53/0x370 [ 1104.668183][T31987] kern_path+0x20/0x40 [ 1104.672255][T31987] lookup_bdev.part.0+0x7b/0x1b0 [ 1104.677368][T31987] ? blkdev_open+0x290/0x290 [ 1104.682214][T31987] ? lock_downgrade+0x880/0x880 [ 1104.687086][T31987] blkdev_get_by_path+0x81/0x130 [ 1104.692119][T31987] btrfs_scan_one_device+0xd3/0x720 [ 1104.697333][T31987] ? kfree+0x173/0x230 [ 1104.701409][T31987] ? device_list_add+0x14d0/0x14d0 [ 1104.706531][T31987] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 1104.712557][T31987] ? btrfs_mount_root+0xb36/0x1220 [ 1104.717701][T31987] btrfs_mount_root+0x718/0x1220 [ 1104.722753][T31987] ? btrfs_decode_error+0x70/0x70 [ 1104.727886][T31987] ? rcu_read_lock_sched_held+0x110/0x130 [ 1104.733798][T31987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.740057][T31987] ? vfs_parse_fs_string+0x111/0x170 [ 1104.745343][T31987] ? vfs_parse_fs_string+0x111/0x170 [ 1104.750656][T31987] ? rcu_read_lock_sched_held+0x110/0x130 [ 1104.769075][T31987] ? kfree+0x1fa/0x230 [ 1104.773167][T31987] ? vfs_parse_fs_string+0x116/0x170 [ 1104.778548][T31987] ? btrfs_decode_error+0x70/0x70 [ 1104.783677][T31987] legacy_get_tree+0xf2/0x200 [ 1104.788366][T31987] vfs_get_tree+0x123/0x450 [ 1104.792907][T31987] fc_mount+0x17/0xc0 [ 1104.796892][T31987] vfs_kern_mount.part.0+0xd8/0xf0 [ 1104.802016][T31987] vfs_kern_mount+0x40/0x60 [ 1104.806523][T31987] btrfs_mount+0x2b4/0x15e2 [ 1104.811118][T31987] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1104.816868][T31987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.823167][T31987] ? should_fail+0x1de/0x852 [ 1104.827774][T31987] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1104.833622][T31987] ? btrfs_remount+0x11f0/0x11f0 [ 1104.838598][T31987] ? rcu_read_lock_sched_held+0x110/0x130 [ 1104.848636][T31987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.869573][T31987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.875838][T31987] ? vfs_parse_fs_string+0x111/0x170 [ 1104.881214][T31987] ? vfs_parse_fs_string+0x111/0x170 [ 1104.886681][T31987] ? rcu_read_lock_sched_held+0x110/0x130 [ 1104.892405][T31987] ? kfree+0x1fa/0x230 [ 1104.896478][T31987] ? vfs_parse_fs_string+0x116/0x170 [ 1104.901772][T31987] ? btrfs_remount+0x11f0/0x11f0 [ 1104.906730][T31987] legacy_get_tree+0xf2/0x200 [ 1104.911421][T31987] ? btrfs_remount+0x11f0/0x11f0 [ 1104.916371][T31987] ? legacy_get_tree+0xf2/0x200 [ 1104.921237][T31987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.927566][T31987] vfs_get_tree+0x123/0x450 [ 1104.932076][T31987] do_mount+0x1436/0x2c40 [ 1104.936519][T31987] ? retint_kernel+0x2d/0x2d [ 1104.941289][T31987] ? copy_mount_string+0x40/0x40 [ 1104.946315][T31987] ? copy_mount_options+0x1d9/0x3a0 [ 1104.951782][T31987] ? write_comp_data+0x68/0x70 [ 1104.956563][T31987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.962839][T31987] ? copy_mount_options+0x280/0x3a0 [ 1104.968050][T31987] ksys_mount+0xdb/0x150 [ 1104.972298][T31987] __x64_sys_mount+0xbe/0x150 [ 1104.977071][T31987] do_syscall_64+0x103/0x610 [ 1104.981678][T31987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1104.987567][T31987] RIP: 0033:0x45ac7a [ 1104.991467][T31987] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1105.011710][T31987] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:54:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000200004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1105.020244][T31987] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1105.028367][T31987] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1105.036686][T31987] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1105.044677][T31987] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1105.052646][T31987] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:44 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001004c00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}]}, 0x2c}}, 0x0) 04:54:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1105.257650][T32000] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:45 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1300]}, 0x63) 04:54:45 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}]}, 0x2c}}, 0x0) 04:54:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000014d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1105.331259][T32000] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1105.427267][T32010] FAULT_INJECTION: forcing a failure. [ 1105.427267][T32010] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1105.440718][T32010] CPU: 0 PID: 32010 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1105.449926][T32010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.460166][T32010] Call Trace: [ 1105.463771][T32010] dump_stack+0x172/0x1f0 [ 1105.468617][T32010] should_fail.cold+0xa/0x15 [ 1105.473793][T32010] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1105.479625][T32010] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1105.485699][T32010] ? __lock_acquire+0x548/0x3fb0 [ 1105.490640][T32010] ? legacy_get_tree+0xf2/0x200 [ 1105.495702][T32010] ? vfs_get_tree+0x123/0x450 [ 1105.500383][T32010] ? do_mount+0x1436/0x2c40 [ 1105.505049][T32010] ? ksys_mount+0xdb/0x150 [ 1105.510189][T32010] should_fail_alloc_page+0x50/0x60 [ 1105.515648][T32010] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1105.525385][T32010] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1105.531892][T32010] ? find_held_lock+0x35/0x130 [ 1105.536759][T32010] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1105.542761][T32010] cache_grow_begin+0x9c/0x860 [ 1105.547791][T32010] ? btrfs_mount_root+0x174/0x1220 [ 1105.553471][T32010] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1105.562275][T32010] kmem_cache_alloc_trace+0x67f/0x760 [ 1105.567654][T32010] ? kasan_kmalloc+0x9/0x10 [ 1105.572432][T32010] btrfs_mount_root+0x174/0x1220 [ 1105.577370][T32010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.584493][T32010] ? btrfs_decode_error+0x70/0x70 [ 1105.589519][T32010] ? rcu_read_lock_sched_held+0x110/0x130 [ 1105.595234][T32010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.601657][T32010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.607996][T32010] ? vfs_parse_fs_string+0x111/0x170 [ 1105.613479][T32010] ? vfs_parse_fs_string+0x111/0x170 [ 1105.618856][T32010] ? rcu_read_lock_sched_held+0x110/0x130 [ 1105.625031][T32010] ? kfree+0x1fa/0x230 [ 1105.629666][T32010] ? vfs_parse_fs_string+0x116/0x170 [ 1105.635323][T32010] ? btrfs_decode_error+0x70/0x70 [ 1105.640436][T32010] legacy_get_tree+0xf2/0x200 [ 1105.645116][T32010] vfs_get_tree+0x123/0x450 [ 1105.649890][T32010] fc_mount+0x17/0xc0 [ 1105.653877][T32010] vfs_kern_mount.part.0+0xd8/0xf0 [ 1105.660377][T32010] vfs_kern_mount+0x40/0x60 [ 1105.664897][T32010] btrfs_mount+0x2b4/0x15e2 [ 1105.669394][T32010] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1105.675024][T32010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.681351][T32010] ? should_fail+0x1de/0x852 [ 1105.685951][T32010] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1105.691976][T32010] ? btrfs_remount+0x11f0/0x11f0 [ 1105.697352][T32010] ? rcu_read_lock_sched_held+0x110/0x130 [ 1105.703296][T32010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.709531][T32010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.715776][T32010] ? vfs_parse_fs_string+0x111/0x170 [ 1105.721142][T32010] ? vfs_parse_fs_string+0x111/0x170 [ 1105.726422][T32010] ? rcu_read_lock_sched_held+0x110/0x130 [ 1105.732132][T32010] ? kfree+0x1fa/0x230 [ 1105.736197][T32010] ? vfs_parse_fs_string+0x116/0x170 [ 1105.741480][T32010] ? btrfs_remount+0x11f0/0x11f0 [ 1105.746586][T32010] legacy_get_tree+0xf2/0x200 [ 1105.751365][T32010] ? btrfs_remount+0x11f0/0x11f0 [ 1105.756294][T32010] ? legacy_get_tree+0xf2/0x200 [ 1105.761140][T32010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.767381][T32010] vfs_get_tree+0x123/0x450 [ 1105.771880][T32010] do_mount+0x1436/0x2c40 [ 1105.776213][T32010] ? copy_mount_string+0x40/0x40 [ 1105.781230][T32010] ? copy_mount_options+0x1ea/0x3a0 [ 1105.786433][T32010] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 1105.792510][T32010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.798752][T32010] ? copy_mount_options+0x280/0x3a0 [ 1105.803945][T32010] ksys_mount+0xdb/0x150 [ 1105.808184][T32010] __x64_sys_mount+0xbe/0x150 [ 1105.812860][T32010] do_syscall_64+0x103/0x610 [ 1105.817539][T32010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.823433][T32010] RIP: 0033:0x45ac7a [ 1105.827412][T32010] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1105.847181][T32010] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1105.855786][T32010] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1105.863840][T32010] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 04:54:45 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001006000004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000024d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1105.871813][T32010] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1105.879771][T32010] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1105.887766][T32010] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}]}, 0x2c}}, 0x0) 04:54:45 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000034d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}]}, 0x2c}}, 0x0) 04:54:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1106.106819][T32021] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000044d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1106.221789][T32030] FAULT_INJECTION: forcing a failure. [ 1106.221789][T32030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1106.237742][T32030] CPU: 1 PID: 32030 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1106.246852][T32030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.256995][T32030] Call Trace: [ 1106.260297][T32030] dump_stack+0x172/0x1f0 [ 1106.264645][T32030] should_fail.cold+0xa/0x15 [ 1106.269243][T32030] ? legacy_get_tree+0xf2/0x200 [ 1106.274097][T32030] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1106.279916][T32030] ? __lock_acquire+0x548/0x3fb0 [ 1106.284941][T32030] ? do_syscall_64+0x103/0x610 [ 1106.289718][T32030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.295868][T32030] ? ksys_mount+0xdb/0x150 [ 1106.300296][T32030] should_fail_alloc_page+0x50/0x60 [ 1106.305494][T32030] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1106.311013][T32030] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1106.316816][T32030] ? find_held_lock+0x35/0x130 [ 1106.321692][T32030] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1106.327526][T32030] cache_grow_begin+0x9c/0x860 [ 1106.332296][T32030] ? btrfs_mount_root+0x1d0/0x1220 [ 1106.337405][T32030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1106.343650][T32030] kmem_cache_alloc_trace+0x67f/0x760 [ 1106.349213][T32030] btrfs_mount_root+0x1d0/0x1220 [ 1106.354558][T32030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.360802][T32030] ? btrfs_decode_error+0x70/0x70 [ 1106.365829][T32030] ? rcu_read_lock_sched_held+0x110/0x130 [ 1106.371723][T32030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.378133][T32030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.384465][T32030] ? vfs_parse_fs_string+0x111/0x170 [ 1106.389856][T32030] ? vfs_parse_fs_string+0x111/0x170 [ 1106.395157][T32030] ? rcu_read_lock_sched_held+0x110/0x130 [ 1106.400880][T32030] ? kfree+0x1fa/0x230 [ 1106.404949][T32030] ? vfs_parse_fs_string+0x116/0x170 [ 1106.410232][T32030] ? btrfs_decode_error+0x70/0x70 [ 1106.415251][T32030] legacy_get_tree+0xf2/0x200 [ 1106.420243][T32030] vfs_get_tree+0x123/0x450 [ 1106.424745][T32030] fc_mount+0x17/0xc0 [ 1106.428724][T32030] vfs_kern_mount.part.0+0xd8/0xf0 [ 1106.434097][T32030] vfs_kern_mount+0x40/0x60 [ 1106.438603][T32030] btrfs_mount+0x2b4/0x15e2 [ 1106.443156][T32030] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1106.448787][T32030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.455036][T32030] ? should_fail+0x1de/0x852 [ 1106.459626][T32030] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1106.465434][T32030] ? btrfs_remount+0x11f0/0x11f0 [ 1106.470376][T32030] ? rcu_read_lock_sched_held+0x110/0x130 [ 1106.476095][T32030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.482447][T32030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.489032][T32030] ? vfs_parse_fs_string+0x111/0x170 [ 1106.494488][T32030] ? vfs_parse_fs_string+0x111/0x170 [ 1106.499773][T32030] ? rcu_read_lock_sched_held+0x110/0x130 [ 1106.505494][T32030] ? kfree+0x1fa/0x230 [ 1106.509568][T32030] ? vfs_parse_fs_string+0x116/0x170 [ 1106.514943][T32030] ? btrfs_remount+0x11f0/0x11f0 [ 1106.519880][T32030] legacy_get_tree+0xf2/0x200 [ 1106.524732][T32030] ? btrfs_remount+0x11f0/0x11f0 [ 1106.529675][T32030] ? legacy_get_tree+0xf2/0x200 [ 1106.534618][T32030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.540855][T32030] vfs_get_tree+0x123/0x450 [ 1106.545354][T32030] do_mount+0x1436/0x2c40 [ 1106.549696][T32030] ? copy_mount_string+0x40/0x40 [ 1106.554630][T32030] ? _copy_from_user+0xdd/0x150 [ 1106.559489][T32030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.565729][T32030] ? copy_mount_options+0x280/0x3a0 [ 1106.570928][T32030] ksys_mount+0xdb/0x150 [ 1106.575195][T32030] __x64_sys_mount+0xbe/0x150 [ 1106.579872][T32030] do_syscall_64+0x103/0x610 [ 1106.584466][T32030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.590441][T32030] RIP: 0033:0x45ac7a [ 1106.594336][T32030] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1106.614023][T32030] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1106.622536][T32030] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1106.630516][T32030] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1106.638486][T32030] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1106.646462][T32030] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1106.654429][T32030] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:46 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1400]}, 0x63) 04:54:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}]}, 0x2c}}, 0x0) 04:54:46 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001006800004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000064d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}]}, 0x2c}}, 0x0) 04:54:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:46 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1106.934170][T32044] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00000000000000003f4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1107.027152][T32044] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}]}, 0x2c}}, 0x0) 04:54:46 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001006c00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1107.117856][T32059] FAULT_INJECTION: forcing a failure. [ 1107.117856][T32059] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.173554][T32059] CPU: 1 PID: 32059 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1107.183353][T32059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.193703][T32059] Call Trace: [ 1107.197731][T32059] dump_stack+0x172/0x1f0 [ 1107.202424][T32059] should_fail.cold+0xa/0x15 [ 1107.207294][T32059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1107.213300][T32059] ? find_get_entry+0x50e/0x880 [ 1107.218279][T32059] __should_failslab+0x121/0x190 [ 1107.223343][T32059] should_failslab+0x9/0x14 [ 1107.227942][T32059] kmem_cache_alloc+0x47/0x6f0 [ 1107.233185][T32059] ? ___might_sleep+0x163/0x280 [ 1107.238056][T32059] ? mempool_alloc+0x380/0x380 [ 1107.243002][T32059] mempool_alloc_slab+0x47/0x60 [ 1107.248917][T32059] mempool_alloc+0x16b/0x380 [ 1107.253523][T32059] ? mempool_destroy+0x40/0x40 [ 1107.258289][T32059] ? mark_held_locks+0xa4/0xf0 [ 1107.263063][T32059] ? lock_downgrade+0x880/0x880 [ 1107.268437][T32059] ? __find_get_block+0x9ba/0xcf0 [ 1107.273644][T32059] ? __getblk_gfp+0x2c8/0xd30 [ 1107.278500][T32059] ? __find_get_block+0x9ba/0xcf0 [ 1107.283625][T32059] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1107.288933][T32059] bio_alloc_bioset+0x3bf/0x680 [ 1107.293785][T32059] ? __find_get_block+0x317/0xcf0 [ 1107.298821][T32059] ? bvec_alloc+0x2f0/0x2f0 [ 1107.303338][T32059] submit_bh_wbc+0x133/0x7f0 [ 1107.308107][T32059] __bread_gfp+0x13d/0x300 [ 1107.312827][T32059] btrfs_read_dev_one_super+0xb6/0x2a0 [ 1107.318292][T32059] btrfs_read_dev_super+0x6c/0xd0 [ 1107.323501][T32059] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 1107.329230][T32059] btrfs_get_bdev_and_sb+0xff/0x300 [ 1107.334519][T32059] open_fs_devices+0x68e/0xbd0 [ 1107.339725][T32059] ? find_fsid+0x2e0/0x2e0 [ 1107.344158][T32059] ? memmove_extent_buffer.cold+0x42/0x42 [ 1107.350168][T32059] btrfs_open_devices+0x147/0x170 [ 1107.355371][T32059] btrfs_mount_root+0x79a/0x1220 [ 1107.360330][T32059] ? btrfs_decode_error+0x70/0x70 [ 1107.365452][T32059] ? rcu_read_lock_sched_held+0x110/0x130 [ 1107.371265][T32059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.377635][T32059] ? vfs_parse_fs_string+0x111/0x170 [ 1107.383183][T32059] ? vfs_parse_fs_string+0x111/0x170 [ 1107.388478][T32059] ? rcu_read_lock_sched_held+0x110/0x130 [ 1107.394299][T32059] ? kfree+0x1fa/0x230 [ 1107.398467][T32059] ? vfs_parse_fs_string+0x116/0x170 [ 1107.403786][T32059] ? btrfs_decode_error+0x70/0x70 [ 1107.408812][T32059] legacy_get_tree+0xf2/0x200 [ 1107.413496][T32059] vfs_get_tree+0x123/0x450 [ 1107.418020][T32059] fc_mount+0x17/0xc0 [ 1107.422012][T32059] vfs_kern_mount.part.0+0xd8/0xf0 [ 1107.427212][T32059] vfs_kern_mount+0x40/0x60 [ 1107.431724][T32059] btrfs_mount+0x2b4/0x15e2 [ 1107.436868][T32059] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1107.442653][T32059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.448895][T32059] ? should_fail+0x1de/0x852 [ 1107.453495][T32059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1107.459307][T32059] ? btrfs_remount+0x11f0/0x11f0 [ 1107.464257][T32059] ? rcu_read_lock_sched_held+0x110/0x130 [ 1107.470082][T32059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.476406][T32059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.482666][T32059] ? vfs_parse_fs_string+0x111/0x170 [ 1107.487955][T32059] ? vfs_parse_fs_string+0x111/0x170 [ 1107.493334][T32059] ? rcu_read_lock_sched_held+0x110/0x130 [ 1107.499606][T32059] ? kfree+0x1fa/0x230 [ 1107.503692][T32059] ? vfs_parse_fs_string+0x116/0x170 [ 1107.509137][T32059] ? btrfs_remount+0x11f0/0x11f0 [ 1107.514092][T32059] legacy_get_tree+0xf2/0x200 [ 1107.518884][T32059] ? btrfs_remount+0x11f0/0x11f0 [ 1107.524096][T32059] ? legacy_get_tree+0xf2/0x200 [ 1107.529480][T32059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.535818][T32059] vfs_get_tree+0x123/0x450 [ 1107.540345][T32059] do_mount+0x1436/0x2c40 [ 1107.544701][T32059] ? copy_mount_string+0x40/0x40 [ 1107.549910][T32059] ? _copy_from_user+0xdd/0x150 [ 1107.554767][T32059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.561008][T32059] ? copy_mount_options+0x280/0x3a0 [ 1107.566298][T32059] ksys_mount+0xdb/0x150 [ 1107.570638][T32059] __x64_sys_mount+0xbe/0x150 [ 1107.575408][T32059] do_syscall_64+0x103/0x610 [ 1107.580007][T32059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.585898][T32059] RIP: 0033:0x45ac7a [ 1107.589791][T32059] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1107.609475][T32059] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1107.617875][T32059] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a 04:54:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000804d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1107.625845][T32059] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1107.633916][T32059] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1107.641896][T32059] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1107.649972][T32059] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}]}, 0x2c}}, 0x0) 04:54:47 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1500]}, 0x63) 04:54:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1107.752666][T32066] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:47 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000fffffff64d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1107.851145][T32066] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}]}, 0x2c}}, 0x0) 04:54:47 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001007400004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000fffffdfc4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1108.006726][T32085] FAULT_INJECTION: forcing a failure. [ 1108.006726][T32085] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.063349][T32085] CPU: 0 PID: 32085 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1108.072835][T32085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.082917][T32085] Call Trace: [ 1108.086597][T32085] dump_stack+0x172/0x1f0 [ 1108.090963][T32085] should_fail.cold+0xa/0x15 [ 1108.095681][T32085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1108.101537][T32085] ? ___might_sleep+0x163/0x280 [ 1108.106560][T32085] __should_failslab+0x121/0x190 [ 1108.121692][T32085] should_failslab+0x9/0x14 [ 1108.127180][T32085] __kmalloc+0x2dc/0x740 [ 1108.131456][T32085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.137722][T32085] ? btrfs_find_device+0x189/0x1d0 [ 1108.142948][T32085] ? device_list_add+0xf16/0x14d0 [ 1108.148006][T32085] device_list_add+0xf16/0x14d0 [ 1108.152896][T32085] ? btrfs_rm_dev_replace_free_srcdev+0x300/0x300 [ 1108.159367][T32085] ? ___might_sleep+0x163/0x280 [ 1108.164249][T32085] btrfs_scan_one_device+0x378/0x720 [ 1108.169558][T32085] ? btrfs_scan_one_device+0x378/0x720 [ 1108.169577][T32085] ? device_list_add+0x14d0/0x14d0 [ 1108.169595][T32085] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 1108.169616][T32085] ? btrfs_mount_root+0xb36/0x1220 [ 1108.169636][T32085] btrfs_mount_root+0x718/0x1220 [ 1108.169661][T32085] ? btrfs_decode_error+0x70/0x70 [ 1108.191372][T32085] ? rcu_read_lock_sched_held+0x110/0x130 [ 1108.191394][T32085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.191416][T32085] ? vfs_parse_fs_string+0x111/0x170 [ 1108.191432][T32085] ? vfs_parse_fs_string+0x111/0x170 [ 1108.191447][T32085] ? rcu_read_lock_sched_held+0x110/0x130 [ 1108.191462][T32085] ? kfree+0x1fa/0x230 [ 1108.191476][T32085] ? vfs_parse_fs_string+0x116/0x170 [ 1108.191495][T32085] ? btrfs_decode_error+0x70/0x70 [ 1108.191508][T32085] legacy_get_tree+0xf2/0x200 [ 1108.191536][T32085] vfs_get_tree+0x123/0x450 [ 1108.191554][T32085] fc_mount+0x17/0xc0 [ 1108.191568][T32085] vfs_kern_mount.part.0+0xd8/0xf0 [ 1108.191584][T32085] vfs_kern_mount+0x40/0x60 [ 1108.191601][T32085] btrfs_mount+0x2b4/0x15e2 [ 1108.191617][T32085] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1108.191628][T32085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.191643][T32085] ? should_fail+0x1de/0x852 [ 1108.191660][T32085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1108.191687][T32085] ? btrfs_remount+0x11f0/0x11f0 [ 1108.301402][T32085] ? rcu_read_lock_sched_held+0x110/0x130 [ 1108.307134][T32085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.307151][T32085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:54:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x0f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}]}, 0x2c}}, 0x0) 04:54:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}}]}, 0x2c}}, 0x0) [ 1108.307173][T32085] ? vfs_parse_fs_string+0x111/0x170 [ 1108.307190][T32085] ? vfs_parse_fs_string+0x111/0x170 [ 1108.307208][T32085] ? rcu_read_lock_sched_held+0x110/0x130 [ 1108.307228][T32085] ? kfree+0x1fa/0x230 [ 1108.319788][T32085] ? vfs_parse_fs_string+0x116/0x170 [ 1108.319815][T32085] ? btrfs_remount+0x11f0/0x11f0 [ 1108.319831][T32085] legacy_get_tree+0xf2/0x200 [ 1108.319846][T32085] ? btrfs_remount+0x11f0/0x11f0 [ 1108.319859][T32085] ? legacy_get_tree+0xf2/0x200 [ 1108.319879][T32085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.319894][T32085] vfs_get_tree+0x123/0x450 [ 1108.319910][T32085] do_mount+0x1436/0x2c40 [ 1108.319929][T32085] ? copy_mount_string+0x40/0x40 [ 1108.319945][T32085] ? _copy_from_user+0xdd/0x150 [ 1108.319964][T32085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.336788][T32085] ? copy_mount_options+0x280/0x3a0 [ 1108.336807][T32085] ksys_mount+0xdb/0x150 [ 1108.336826][T32085] __x64_sys_mount+0xbe/0x150 [ 1108.336850][T32085] do_syscall_64+0x103/0x610 [ 1108.336879][T32085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1108.336890][T32085] RIP: 0033:0x45ac7a [ 1108.336904][T32085] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1108.336910][T32085] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1108.336924][T32085] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1108.336932][T32085] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1108.336940][T32085] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1108.336948][T32085] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1108.336955][T32085] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000fffffffe4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1108.611025][T32100] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:48 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1108.707117][T32100] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1108.784076][T32110] FAULT_INJECTION: forcing a failure. [ 1108.784076][T32110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1108.813218][T32110] CPU: 1 PID: 32110 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1108.822514][T32110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.832748][T32110] Call Trace: [ 1108.836141][T32110] dump_stack+0x172/0x1f0 [ 1108.840567][T32110] should_fail.cold+0xa/0x15 [ 1108.845251][T32110] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1108.851060][T32110] ? ___might_sleep+0x163/0x280 [ 1108.855946][T32110] should_fail_alloc_page+0x50/0x60 [ 1108.861148][T32110] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1108.866559][T32110] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1108.872388][T32110] ? blkdev_get+0x5a4/0x990 [ 1108.876912][T32110] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1108.883293][T32110] alloc_pages_current+0x107/0x210 [ 1108.888415][T32110] __page_cache_alloc+0x2bd/0x460 [ 1108.893491][T32110] do_read_cache_page+0xc05/0x14c0 [ 1108.898601][T32110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.904850][T32110] ? blkdev_writepages+0x30/0x30 [ 1108.909793][T32110] ? blkdev_get+0xcc/0x990 [ 1108.914383][T32110] ? pagecache_get_page+0x770/0x770 [ 1108.919620][T32110] ? bd_may_claim+0xd0/0xd0 [ 1108.924651][T32110] ? lookup_bdev.part.0+0x10e/0x1b0 [ 1108.929931][T32110] ? blkdev_open+0x290/0x290 [ 1108.934536][T32110] ? lock_downgrade+0x880/0x880 [ 1108.939396][T32110] read_cache_page_gfp+0x6e/0x90 [ 1108.944440][T32110] btrfs_scan_one_device+0x19b/0x720 [ 1108.950043][T32110] ? kfree+0x173/0x230 [ 1108.954113][T32110] ? device_list_add+0x14d0/0x14d0 [ 1108.959337][T32110] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 1108.965233][T32110] ? btrfs_mount_root+0xb36/0x1220 [ 1108.970349][T32110] btrfs_mount_root+0x718/0x1220 [ 1108.975384][T32110] ? btrfs_decode_error+0x70/0x70 [ 1108.980412][T32110] ? rcu_read_lock_sched_held+0x110/0x130 [ 1108.986159][T32110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.992432][T32110] ? vfs_parse_fs_string+0x111/0x170 [ 1108.997826][T32110] ? vfs_parse_fs_string+0x111/0x170 [ 1109.003113][T32110] ? rcu_read_lock_sched_held+0x110/0x130 [ 1109.008942][T32110] ? kfree+0x1fa/0x230 [ 1109.013101][T32110] ? vfs_parse_fs_string+0x116/0x170 [ 1109.018408][T32110] ? btrfs_decode_error+0x70/0x70 [ 1109.023700][T32110] legacy_get_tree+0xf2/0x200 [ 1109.028387][T32110] vfs_get_tree+0x123/0x450 [ 1109.032966][T32110] fc_mount+0x17/0xc0 [ 1109.036951][T32110] vfs_kern_mount.part.0+0xd8/0xf0 [ 1109.042067][T32110] vfs_kern_mount+0x40/0x60 [ 1109.046581][T32110] btrfs_mount+0x2b4/0x15e2 [ 1109.051277][T32110] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1109.056916][T32110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.063244][T32110] ? should_fail+0x1de/0x852 [ 1109.067959][T32110] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1109.073904][T32110] ? btrfs_remount+0x11f0/0x11f0 [ 1109.078851][T32110] ? rcu_read_lock_sched_held+0x110/0x130 [ 1109.084571][T32110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.090912][T32110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.097337][T32110] ? vfs_parse_fs_string+0x111/0x170 [ 1109.102729][T32110] ? vfs_parse_fs_string+0x111/0x170 [ 1109.108016][T32110] ? rcu_read_lock_sched_held+0x110/0x130 [ 1109.113752][T32110] ? kfree+0x1fa/0x230 [ 1109.117850][T32110] ? vfs_parse_fs_string+0x116/0x170 [ 1109.123163][T32110] ? btrfs_remount+0x11f0/0x11f0 [ 1109.128107][T32110] legacy_get_tree+0xf2/0x200 [ 1109.133131][T32110] ? btrfs_remount+0x11f0/0x11f0 [ 1109.138075][T32110] ? legacy_get_tree+0xf2/0x200 [ 1109.143067][T32110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.149491][T32110] vfs_get_tree+0x123/0x450 [ 1109.153997][T32110] do_mount+0x1436/0x2c40 [ 1109.158334][T32110] ? copy_mount_string+0x40/0x40 [ 1109.163273][T32110] ? _copy_from_user+0xdd/0x150 [ 1109.168130][T32110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.174482][T32110] ? copy_mount_options+0x280/0x3a0 [ 1109.179685][T32110] ksys_mount+0xdb/0x150 [ 1109.183935][T32110] __x64_sys_mount+0xbe/0x150 [ 1109.188881][T32110] do_syscall_64+0x103/0x610 [ 1109.193485][T32110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1109.199412][T32110] RIP: 0033:0x45ac7a [ 1109.203407][T32110] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 04:54:49 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x63) 04:54:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000ffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}}]}, 0x2c}}, 0x0) 04:54:49 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001007a00004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1109.223190][T32110] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1109.237282][T32110] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1109.245546][T32110] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1109.253602][T32110] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1109.261583][T32110] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1109.269683][T32110] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:49 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00ffffffffffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105000000000000]}}]}, 0x2c}}, 0x0) [ 1109.471361][T32124] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000022301000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}]}, 0x2c}}, 0x0) 04:54:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000020000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1109.601765][T32131] FAULT_INJECTION: forcing a failure. [ 1109.601765][T32131] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.615393][T32131] CPU: 1 PID: 32131 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1109.624523][T32131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.634977][T32131] Call Trace: [ 1109.638285][T32131] dump_stack+0x172/0x1f0 [ 1109.638307][T32131] should_fail.cold+0xa/0x15 [ 1109.638330][T32131] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1109.653374][T32131] __should_failslab+0x121/0x190 [ 1109.658323][T32131] should_failslab+0x9/0x14 [ 1109.663021][T32131] kmem_cache_alloc+0x47/0x6f0 [ 1109.667880][T32131] ? __lock_acquire+0x548/0x3fb0 [ 1109.673005][T32131] xas_alloc+0x2df/0x3d0 [ 1109.677374][T32131] xas_create+0x2cd/0xff0 [ 1109.682044][T32131] xas_store+0x9a/0x19b0 [ 1109.686294][T32131] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1109.692541][T32131] ? xas_start+0x166/0x560 [ 1109.697488][T32131] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1109.703819][T32131] ? xas_load+0x67/0x150 [ 1109.708066][T32131] __add_to_page_cache_locked+0x5b7/0xe70 [ 1109.713795][T32131] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1109.720042][T32131] ? count_shadow_nodes+0x500/0x500 [ 1109.725252][T32131] add_to_page_cache_lru+0x1f1/0x780 [ 1109.730626][T32131] ? add_to_page_cache_locked+0x40/0x40 [ 1109.736176][T32131] ? __page_cache_alloc+0x131/0x460 [ 1109.741554][T32131] do_read_cache_page+0xc2e/0x14c0 [ 1109.746991][T32131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.753253][T32131] ? blkdev_writepages+0x30/0x30 [ 1109.758195][T32131] ? blkdev_get+0xcc/0x990 [ 1109.762701][T32131] ? pagecache_get_page+0x770/0x770 [ 1109.767904][T32131] ? bd_may_claim+0xd0/0xd0 [ 1109.772497][T32131] ? lookup_bdev.part.0+0x10e/0x1b0 [ 1109.777690][T32131] ? blkdev_open+0x290/0x290 [ 1109.782310][T32131] ? lock_downgrade+0x880/0x880 [ 1109.787263][T32131] read_cache_page_gfp+0x6e/0x90 [ 1109.792205][T32131] btrfs_scan_one_device+0x19b/0x720 [ 1109.797496][T32131] ? kfree+0x173/0x230 [ 1109.801659][T32131] ? device_list_add+0x14d0/0x14d0 [ 1109.806945][T32131] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 1109.814107][T32131] ? btrfs_mount_root+0xb36/0x1220 [ 1109.819242][T32131] btrfs_mount_root+0x718/0x1220 [ 1109.824190][T32131] ? btrfs_decode_error+0x70/0x70 [ 1109.829307][T32131] ? rcu_read_lock_sched_held+0x110/0x130 [ 1109.835030][T32131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.841366][T32131] ? vfs_parse_fs_string+0x111/0x170 [ 1109.846678][T32131] ? vfs_parse_fs_string+0x111/0x170 [ 1109.851970][T32131] ? rcu_read_lock_sched_held+0x110/0x130 [ 1109.857885][T32131] ? kfree+0x1fa/0x230 [ 1109.861971][T32131] ? vfs_parse_fs_string+0x116/0x170 [ 1109.867390][T32131] ? btrfs_decode_error+0x70/0x70 [ 1109.872795][T32131] legacy_get_tree+0xf2/0x200 [ 1109.877483][T32131] vfs_get_tree+0x123/0x450 [ 1109.881990][T32131] fc_mount+0x17/0xc0 [ 1109.886148][T32131] vfs_kern_mount.part.0+0xd8/0xf0 [ 1109.891267][T32131] vfs_kern_mount+0x40/0x60 [ 1109.895780][T32131] btrfs_mount+0x2b4/0x15e2 [ 1109.900379][T32131] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1109.906044][T32131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.912283][T32131] ? should_fail+0x1de/0x852 [ 1109.916878][T32131] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1109.922691][T32131] ? btrfs_remount+0x11f0/0x11f0 [ 1109.927638][T32131] ? rcu_read_lock_sched_held+0x110/0x130 [ 1109.933357][T32131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.939736][T32131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.945985][T32131] ? vfs_parse_fs_string+0x111/0x170 [ 1109.951375][T32131] ? vfs_parse_fs_string+0x111/0x170 [ 1109.956835][T32131] ? rcu_read_lock_sched_held+0x110/0x130 [ 1109.962570][T32131] ? kfree+0x1fa/0x230 [ 1109.966644][T32131] ? vfs_parse_fs_string+0x116/0x170 [ 1109.971938][T32131] ? btrfs_remount+0x11f0/0x11f0 [ 1109.976988][T32131] legacy_get_tree+0xf2/0x200 [ 1109.981671][T32131] ? btrfs_remount+0x11f0/0x11f0 [ 1109.986610][T32131] ? legacy_get_tree+0xf2/0x200 [ 1109.991725][T32131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.998055][T32131] vfs_get_tree+0x123/0x450 [ 1110.002712][T32131] do_mount+0x1436/0x2c40 [ 1110.007141][T32131] ? copy_mount_string+0x40/0x40 [ 1110.012089][T32131] ? _copy_from_user+0xdd/0x150 [ 1110.016946][T32131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.023448][T32131] ? copy_mount_options+0x280/0x3a0 [ 1110.028748][T32131] ksys_mount+0xdb/0x150 [ 1110.033013][T32131] __x64_sys_mount+0xbe/0x150 [ 1110.037701][T32131] do_syscall_64+0x103/0x610 [ 1110.042478][T32131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1110.048486][T32131] RIP: 0033:0x45ac7a [ 1110.052479][T32131] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1110.078400][T32131] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1110.086994][T32131] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1110.095066][T32131] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 04:54:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1110.103300][T32131] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1110.111278][T32131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1110.119363][T32131] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1110.147254][T32124] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000030000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:50 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x63) 04:54:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}]}, 0x2c}}, 0x0) 04:54:50 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000003004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:50 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1110.472446][T32156] FAULT_INJECTION: forcing a failure. [ 1110.472446][T32156] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.486148][T32156] CPU: 1 PID: 32156 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1110.495970][T32156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1110.506037][T32156] Call Trace: [ 1110.509457][T32156] dump_stack+0x172/0x1f0 [ 1110.514066][T32156] should_fail.cold+0xa/0x15 [ 1110.519118][T32156] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1110.525137][T32156] __should_failslab+0x121/0x190 [ 1110.530092][T32156] should_failslab+0x9/0x14 [ 1110.534700][T32156] kmem_cache_alloc+0x47/0x6f0 [ 1110.539862][T32156] ? __lock_acquire+0x548/0x3fb0 [ 1110.544927][T32156] xas_alloc+0x2df/0x3d0 [ 1110.549185][T32156] xas_create+0x2cd/0xff0 [ 1110.553710][T32156] xas_store+0x9a/0x19b0 [ 1110.558130][T32156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1110.564457][T32156] ? xas_start+0x166/0x560 [ 1110.568908][T32156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1110.575789][T32156] ? xas_load+0x67/0x150 [ 1110.580176][T32156] __add_to_page_cache_locked+0x5b7/0xe70 [ 1110.586022][T32156] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1110.592243][T32156] ? lock_downgrade+0x880/0x880 [ 1110.597110][T32156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.603394][T32156] ? count_shadow_nodes+0x500/0x500 [ 1110.608708][T32156] ? find_get_entry+0x535/0x880 [ 1110.613916][T32156] add_to_page_cache_lru+0x1f1/0x780 [ 1110.619215][T32156] ? add_to_page_cache_locked+0x40/0x40 [ 1110.624860][T32156] ? __page_cache_alloc+0x131/0x460 [ 1110.630096][T32156] pagecache_get_page+0x36f/0x770 [ 1110.635318][T32156] __getblk_gfp+0x3c6/0xd30 [ 1110.640956][T32156] ? kasan_check_write+0x14/0x20 [ 1110.645916][T32156] __bread_gfp+0x2f/0x300 [ 1110.651058][T32156] btrfs_read_dev_one_super+0xb6/0x2a0 [ 1110.656793][T32156] btrfs_read_dev_super+0x6c/0xd0 [ 1110.662261][T32156] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 1110.668516][T32156] btrfs_get_bdev_and_sb+0xff/0x300 [ 1110.673790][T32156] open_fs_devices+0x68e/0xbd0 [ 1110.679115][T32156] ? find_fsid+0x2e0/0x2e0 [ 1110.683721][T32156] ? memmove_extent_buffer.cold+0x42/0x42 [ 1110.690610][T32156] btrfs_open_devices+0x147/0x170 [ 1110.696515][T32156] btrfs_mount_root+0x79a/0x1220 [ 1110.701661][T32156] ? btrfs_decode_error+0x70/0x70 [ 1110.707978][T32156] ? rcu_read_lock_sched_held+0x110/0x130 [ 1110.713806][T32156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.721049][T32156] ? vfs_parse_fs_string+0x111/0x170 [ 1110.726353][T32156] ? vfs_parse_fs_string+0x111/0x170 [ 1110.731734][T32156] ? rcu_read_lock_sched_held+0x110/0x130 [ 1110.737547][T32156] ? kfree+0x1fa/0x230 [ 1110.741875][T32156] ? vfs_parse_fs_string+0x116/0x170 [ 1110.747288][T32156] ? btrfs_decode_error+0x70/0x70 [ 1110.753463][T32156] legacy_get_tree+0xf2/0x200 [ 1110.758237][T32156] vfs_get_tree+0x123/0x450 [ 1110.762851][T32156] fc_mount+0x17/0xc0 [ 1110.766939][T32156] vfs_kern_mount.part.0+0xd8/0xf0 [ 1110.772451][T32156] vfs_kern_mount+0x40/0x60 [ 1110.777086][T32156] btrfs_mount+0x2b4/0x15e2 [ 1110.781947][T32156] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1110.788128][T32156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.794468][T32156] ? should_fail+0x1de/0x852 [ 1110.799064][T32156] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1110.805111][T32156] ? btrfs_remount+0x11f0/0x11f0 [ 1110.810235][T32156] ? rcu_read_lock_sched_held+0x110/0x130 [ 1110.816316][T32156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.822753][T32156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.829001][T32156] ? vfs_parse_fs_string+0x111/0x170 [ 1110.834393][T32156] ? vfs_parse_fs_string+0x111/0x170 [ 1110.839833][T32156] ? rcu_read_lock_sched_held+0x110/0x130 [ 1110.845569][T32156] ? kfree+0x1fa/0x230 [ 1110.849681][T32156] ? vfs_parse_fs_string+0x116/0x170 [ 1110.855089][T32156] ? btrfs_remount+0x11f0/0x11f0 [ 1110.860030][T32156] legacy_get_tree+0xf2/0x200 [ 1110.864713][T32156] ? btrfs_remount+0x11f0/0x11f0 [ 1110.869657][T32156] ? legacy_get_tree+0xf2/0x200 [ 1110.874602][T32156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.880850][T32156] vfs_get_tree+0x123/0x450 [ 1110.885359][T32156] do_mount+0x1436/0x2c40 [ 1110.889700][T32156] ? copy_mount_string+0x40/0x40 [ 1110.894736][T32156] ? _copy_from_user+0xdd/0x150 [ 1110.899847][T32156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.906276][T32156] ? copy_mount_options+0x280/0x3a0 [ 1110.911493][T32156] ksys_mount+0xdb/0x150 [ 1110.916006][T32156] __x64_sys_mount+0xbe/0x150 [ 1110.920703][T32156] do_syscall_64+0x103/0x610 [ 1110.925311][T32156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1110.931222][T32156] RIP: 0033:0x45ac7a [ 1110.935117][T32156] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1110.955160][T32156] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1110.963603][T32156] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a 04:54:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558000000000000]}}]}, 0x2c}}, 0x0) [ 1110.972101][T32156] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1110.980167][T32156] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1110.988428][T32156] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1110.996574][T32156] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000060000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1111.018573][T32159] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:50 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}}]}, 0x2c}}, 0x0) [ 1111.160559][T32159] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:51 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001001004004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:51 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x63) 04:54:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}}]}, 0x2c}}, 0x0) [ 1111.304795][T32173] FAULT_INJECTION: forcing a failure. [ 1111.304795][T32173] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.346965][T32173] CPU: 0 PID: 32173 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1111.356111][T32173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.366181][T32173] Call Trace: [ 1111.369751][T32173] dump_stack+0x172/0x1f0 [ 1111.374362][T32173] should_fail.cold+0xa/0x15 [ 1111.379048][T32173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1111.384869][T32173] ? ___might_sleep+0x163/0x280 [ 1111.389766][T32173] __should_failslab+0x121/0x190 [ 1111.394761][T32173] should_failslab+0x9/0x14 [ 1111.399274][T32173] __kmalloc+0x2dc/0x740 [ 1111.403528][T32173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.409874][T32173] ? btrfs_find_device+0x189/0x1d0 [ 1111.415276][T32173] ? device_list_add+0xf16/0x14d0 [ 1111.420392][T32173] device_list_add+0xf16/0x14d0 [ 1111.425275][T32173] ? btrfs_rm_dev_replace_free_srcdev+0x300/0x300 [ 1111.432443][T32173] ? ___might_sleep+0x163/0x280 [ 1111.437399][T32173] btrfs_scan_one_device+0x378/0x720 [ 1111.442824][T32173] ? btrfs_scan_one_device+0x378/0x720 [ 1111.448463][T32173] ? device_list_add+0x14d0/0x14d0 [ 1111.453578][T32173] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 1111.459392][T32173] ? btrfs_mount_root+0xb36/0x1220 [ 1111.464510][T32173] btrfs_mount_root+0x718/0x1220 [ 1111.469488][T32173] ? btrfs_decode_error+0x70/0x70 [ 1111.474648][T32173] ? rcu_read_lock_sched_held+0x110/0x130 [ 1111.480463][T32173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.486711][T32173] ? vfs_parse_fs_string+0x111/0x170 [ 1111.492198][T32173] ? vfs_parse_fs_string+0x111/0x170 [ 1111.498223][T32173] ? rcu_read_lock_sched_held+0x110/0x130 [ 1111.504137][T32173] ? kfree+0x1fa/0x230 [ 1111.508213][T32173] ? vfs_parse_fs_string+0x116/0x170 [ 1111.513622][T32173] ? btrfs_decode_error+0x70/0x70 [ 1111.518648][T32173] legacy_get_tree+0xf2/0x200 [ 1111.523434][T32173] vfs_get_tree+0x123/0x450 [ 1111.527958][T32173] fc_mount+0x17/0xc0 [ 1111.531948][T32173] vfs_kern_mount.part.0+0xd8/0xf0 [ 1111.537339][T32173] vfs_kern_mount+0x40/0x60 [ 1111.542027][T32173] btrfs_mount+0x2b4/0x15e2 [ 1111.546539][T32173] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1111.552173][T32173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.558440][T32173] ? should_fail+0x1de/0x852 [ 1111.563220][T32173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1111.569046][T32173] ? btrfs_remount+0x11f0/0x11f0 [ 1111.573997][T32173] ? rcu_read_lock_sched_held+0x110/0x130 [ 1111.579818][T32173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.586157][T32173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.592539][T32173] ? vfs_parse_fs_string+0x111/0x170 [ 1111.597860][T32173] ? vfs_parse_fs_string+0x111/0x170 [ 1111.603264][T32173] ? rcu_read_lock_sched_held+0x110/0x130 [ 1111.608992][T32173] ? kfree+0x1fa/0x230 [ 1111.613084][T32173] ? vfs_parse_fs_string+0x116/0x170 [ 1111.618376][T32173] ? btrfs_remount+0x11f0/0x11f0 [ 1111.623424][T32173] legacy_get_tree+0xf2/0x200 [ 1111.628218][T32173] ? btrfs_remount+0x11f0/0x11f0 [ 1111.633268][T32173] ? legacy_get_tree+0xf2/0x200 [ 1111.638667][T32173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.644924][T32173] vfs_get_tree+0x123/0x450 [ 1111.649444][T32173] do_mount+0x1436/0x2c40 [ 1111.653782][T32173] ? copy_mount_string+0x40/0x40 [ 1111.658834][T32173] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 1111.665417][T32173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.671662][T32173] ? copy_mount_options+0x280/0x3a0 [ 1111.676873][T32173] ksys_mount+0xdb/0x150 [ 1111.681307][T32173] __x64_sys_mount+0xbe/0x150 [ 1111.686259][T32173] do_syscall_64+0x103/0x610 [ 1111.690874][T32173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1111.696764][T32173] RIP: 0033:0x45ac7a [ 1111.700837][T32173] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1111.721075][T32173] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1111.729605][T32173] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1111.737773][T32173] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 04:54:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000003f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1111.745770][T32173] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1111.754107][T32173] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1111.762405][T32173] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000002000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000]}}]}, 0x2c}}, 0x0) 04:54:51 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1111.873785][T32182] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000010000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1111.973846][T32182] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}}]}, 0x2c}}, 0x0) 04:54:51 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000005004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1112.046036][T32202] FAULT_INJECTION: forcing a failure. [ 1112.046036][T32202] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.064443][T32202] CPU: 0 PID: 32202 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1112.074300][T32202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.074308][T32202] Call Trace: [ 1112.074339][T32202] dump_stack+0x172/0x1f0 [ 1112.074364][T32202] should_fail.cold+0xa/0x15 [ 1112.074382][T32202] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.074402][T32202] ? ___might_sleep+0x163/0x280 [ 1112.074421][T32202] __should_failslab+0x121/0x190 [ 1112.074440][T32202] should_failslab+0x9/0x14 [ 1112.074455][T32202] kmem_cache_alloc+0x2b2/0x6f0 [ 1112.074466][T32202] ? __wait_on_bit+0x130/0x130 [ 1112.074483][T32202] ? init_wait_var_entry+0x1b0/0x1b0 [ 1112.074497][T32202] getname_kernel+0x53/0x370 [ 1112.074515][T32202] kern_path+0x20/0x40 [ 1112.117293][T32202] lookup_bdev.part.0+0x7b/0x1b0 [ 1112.117310][T32202] ? blkdev_open+0x290/0x290 [ 1112.117330][T32202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.117348][T32202] ? btrfs_read_dev_super+0x8e/0xd0 [ 1112.117363][T32202] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 1112.117379][T32202] blkdev_get_by_path+0x81/0x130 [ 1112.117400][T32202] btrfs_get_bdev_and_sb+0x38/0x300 [ 1112.147936][T32202] open_fs_devices+0x68e/0xbd0 [ 1112.156773][T32202] ? find_fsid+0x2e0/0x2e0 [ 1112.156797][T32202] ? memmove_extent_buffer.cold+0x42/0x42 [ 1112.156817][T32202] btrfs_open_devices+0x147/0x170 [ 1112.156839][T32202] btrfs_mount_root+0x79a/0x1220 [ 1112.156858][T32202] ? btrfs_decode_error+0x70/0x70 [ 1112.156876][T32202] ? rcu_read_lock_sched_held+0x110/0x130 [ 1112.156892][T32202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.156912][T32202] ? vfs_parse_fs_string+0x111/0x170 [ 1112.156926][T32202] ? vfs_parse_fs_string+0x111/0x170 [ 1112.156938][T32202] ? rcu_read_lock_sched_held+0x110/0x130 [ 1112.156961][T32202] ? kfree+0x1fa/0x230 [ 1112.167785][T32202] ? vfs_parse_fs_string+0x116/0x170 [ 1112.167810][T32202] ? btrfs_decode_error+0x70/0x70 [ 1112.167825][T32202] legacy_get_tree+0xf2/0x200 [ 1112.167843][T32202] vfs_get_tree+0x123/0x450 [ 1112.167864][T32202] fc_mount+0x17/0xc0 [ 1112.167879][T32202] vfs_kern_mount.part.0+0xd8/0xf0 [ 1112.167893][T32202] vfs_kern_mount+0x40/0x60 [ 1112.167908][T32202] btrfs_mount+0x2b4/0x15e2 [ 1112.167924][T32202] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1112.167939][T32202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.167954][T32202] ? should_fail+0x1de/0x852 [ 1112.167970][T32202] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.167986][T32202] ? btrfs_remount+0x11f0/0x11f0 [ 1112.168013][T32202] ? rcu_read_lock_sched_held+0x110/0x130 [ 1112.180072][T32202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.180088][T32202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.180109][T32202] ? vfs_parse_fs_string+0x111/0x170 [ 1112.180123][T32202] ? vfs_parse_fs_string+0x111/0x170 [ 1112.180142][T32202] ? rcu_read_lock_sched_held+0x110/0x130 [ 1112.180159][T32202] ? kfree+0x1fa/0x230 [ 1112.180174][T32202] ? vfs_parse_fs_string+0x116/0x170 [ 1112.180203][T32202] ? btrfs_remount+0x11f0/0x11f0 [ 1112.180216][T32202] legacy_get_tree+0xf2/0x200 [ 1112.180228][T32202] ? btrfs_remount+0x11f0/0x11f0 [ 1112.180239][T32202] ? legacy_get_tree+0xf2/0x200 [ 1112.180252][T32202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.180275][T32202] vfs_get_tree+0x123/0x450 [ 1112.202324][T32207] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1112.206008][T32202] do_mount+0x1436/0x2c40 [ 1112.206032][T32202] ? copy_mount_string+0x40/0x40 [ 1112.206048][T32202] ? _copy_from_user+0xdd/0x150 [ 1112.206071][T32202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.206084][T32202] ? copy_mount_options+0x280/0x3a0 [ 1112.206101][T32202] ksys_mount+0xdb/0x150 [ 1112.206113][T32202] __x64_sys_mount+0xbe/0x150 [ 1112.206133][T32202] do_syscall_64+0x103/0x610 [ 1112.206155][T32202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1112.206166][T32202] RIP: 0033:0x45ac7a [ 1112.206190][T32202] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1112.206198][T32202] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1112.206211][T32202] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1112.206218][T32202] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1112.206225][T32202] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1112.206232][T32202] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1112.206247][T32202] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}, 0x2c}}, 0x0) 04:54:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000020000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:52 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x63) 04:54:52 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000006004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:52 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000030000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1112.858396][T32220] FAULT_INJECTION: forcing a failure. [ 1112.858396][T32220] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1112.867771][T32224] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1112.871662][T32220] CPU: 0 PID: 32220 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1112.871673][T32220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.871679][T32220] Call Trace: [ 1112.871706][T32220] dump_stack+0x172/0x1f0 [ 1112.871727][T32220] should_fail.cold+0xa/0x15 [ 1112.871744][T32220] ? __lock_acquire+0x548/0x3fb0 [ 1112.871761][T32220] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.871774][T32220] ? __lock_acquire+0x548/0x3fb0 [ 1112.871796][T32220] should_fail_alloc_page+0x50/0x60 [ 1112.871809][T32220] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1112.871836][T32220] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1112.889619][T32220] ? find_held_lock+0x35/0x130 [ 1112.889652][T32220] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.889675][T32220] cache_grow_begin+0x9c/0x860 [ 1112.889691][T32220] ? getname_kernel+0x53/0x370 [ 1112.889706][T32220] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1112.889722][T32220] kmem_cache_alloc+0x62d/0x6f0 [ 1112.889734][T32220] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1112.889747][T32220] ? devid_cmp+0x95/0xb0 [ 1112.889765][T32220] getname_kernel+0x53/0x370 [ 1112.912169][T32220] kern_path+0x20/0x40 [ 1112.912191][T32220] lookup_bdev.part.0+0x7b/0x1b0 [ 1112.912206][T32220] ? blkdev_open+0x290/0x290 [ 1112.912220][T32220] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1112.912235][T32220] ? list_sort.part.0+0x605/0x8b0 [ 1112.912254][T32220] blkdev_get_by_path+0x81/0x130 [ 1112.912272][T32220] btrfs_get_bdev_and_sb+0x38/0x300 [ 1112.912287][T32220] open_fs_devices+0x68e/0xbd0 [ 1112.912307][T32220] ? find_fsid+0x2e0/0x2e0 [ 1112.912327][T32220] ? memmove_extent_buffer.cold+0x42/0x42 [ 1113.041283][T32220] btrfs_open_devices+0x147/0x170 [ 1113.046500][T32220] btrfs_mount_root+0x79a/0x1220 [ 1113.051453][T32220] ? btrfs_decode_error+0x70/0x70 [ 1113.056851][T32220] ? rcu_read_lock_sched_held+0x110/0x130 [ 1113.063284][T32220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.069652][T32220] ? vfs_parse_fs_string+0x111/0x170 [ 1113.075218][T32220] ? vfs_parse_fs_string+0x111/0x170 [ 1113.080780][T32220] ? rcu_read_lock_sched_held+0x110/0x130 [ 1113.086710][T32220] ? kfree+0x1fa/0x230 [ 1113.090792][T32220] ? vfs_parse_fs_string+0x116/0x170 [ 1113.096264][T32220] ? btrfs_decode_error+0x70/0x70 [ 1113.101697][T32220] legacy_get_tree+0xf2/0x200 [ 1113.106388][T32220] vfs_get_tree+0x123/0x450 [ 1113.110991][T32220] fc_mount+0x17/0xc0 [ 1113.115069][T32220] vfs_kern_mount.part.0+0xd8/0xf0 [ 1113.120569][T32220] vfs_kern_mount+0x40/0x60 [ 1113.125265][T32220] btrfs_mount+0x2b4/0x15e2 [ 1113.129881][T32220] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1113.135636][T32220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.141908][T32220] ? should_fail+0x1de/0x852 [ 1113.146607][T32220] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1113.152617][T32220] ? btrfs_remount+0x11f0/0x11f0 [ 1113.157586][T32220] ? rcu_read_lock_sched_held+0x110/0x130 [ 1113.163324][T32220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.169736][T32220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.176088][T32220] ? vfs_parse_fs_string+0x111/0x170 [ 1113.181390][T32220] ? vfs_parse_fs_string+0x111/0x170 [ 1113.186688][T32220] ? rcu_read_lock_sched_held+0x110/0x130 [ 1113.192594][T32220] ? kfree+0x1fa/0x230 [ 1113.196776][T32220] ? vfs_parse_fs_string+0x116/0x170 [ 1113.202364][T32220] ? btrfs_remount+0x11f0/0x11f0 [ 1113.207416][T32220] legacy_get_tree+0xf2/0x200 [ 1113.212132][T32220] ? btrfs_remount+0x11f0/0x11f0 [ 1113.217264][T32220] ? legacy_get_tree+0xf2/0x200 [ 1113.222141][T32220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.228395][T32220] vfs_get_tree+0x123/0x450 [ 1113.233146][T32220] do_mount+0x1436/0x2c40 [ 1113.237934][T32220] ? copy_mount_string+0x40/0x40 [ 1113.243046][T32220] ? _copy_from_user+0xdd/0x150 [ 1113.247925][T32220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.254179][T32220] ? copy_mount_options+0x280/0x3a0 [ 1113.259740][T32220] ksys_mount+0xdb/0x150 [ 1113.264616][T32220] __x64_sys_mount+0xbe/0x150 [ 1113.269311][T32220] do_syscall_64+0x103/0x610 [ 1113.274111][T32220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1113.280404][T32220] RIP: 0033:0x45ac7a [ 1113.284398][T32220] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 04:54:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}]}, 0x2c}}, 0x0) 04:54:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000040000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1113.305615][T32220] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1113.314281][T32220] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1113.322384][T32220] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1113.330479][T32220] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1113.338569][T32220] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1113.346555][T32220] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 [ 1113.432937][T32224] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:53 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}]}, 0x2c}}, 0x0) 04:54:53 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x63) 04:54:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:53 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000007004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000060000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1113.680778][T32241] FAULT_INJECTION: forcing a failure. [ 1113.680778][T32241] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.710877][T32248] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00000000003f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}]}, 0x2c}}, 0x0) [ 1113.744392][T32241] CPU: 0 PID: 32241 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1113.755053][T32241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.767305][T32241] Call Trace: [ 1113.770767][T32241] dump_stack+0x172/0x1f0 [ 1113.775563][T32241] should_fail.cold+0xa/0x15 [ 1113.780937][T32241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1113.787514][T32241] ? find_get_entry+0x50e/0x880 [ 1113.792839][T32241] __should_failslab+0x121/0x190 [ 1113.798154][T32241] should_failslab+0x9/0x14 [ 1113.803209][T32241] kmem_cache_alloc+0x47/0x6f0 [ 1113.808276][T32241] ? ___might_sleep+0x163/0x280 [ 1113.813327][T32241] ? mempool_alloc+0x380/0x380 [ 1113.818649][T32241] mempool_alloc_slab+0x47/0x60 [ 1113.823699][T32241] mempool_alloc+0x16b/0x380 [ 1113.828402][T32241] ? mempool_destroy+0x40/0x40 [ 1113.833443][T32241] ? mark_held_locks+0xa4/0xf0 [ 1113.838300][T32241] ? lock_downgrade+0x880/0x880 [ 1113.843441][T32241] ? __find_get_block+0x9ba/0xcf0 [ 1113.848559][T32241] ? __getblk_gfp+0x2c8/0xd30 [ 1113.853244][T32241] ? __find_get_block+0x9ba/0xcf0 [ 1113.858369][T32241] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1113.864049][T32241] bio_alloc_bioset+0x3bf/0x680 [ 1113.869285][T32241] ? __find_get_block+0x317/0xcf0 [ 1113.874603][T32241] ? bvec_alloc+0x2f0/0x2f0 [ 1113.879592][T32241] submit_bh_wbc+0x133/0x7f0 [ 1113.884202][T32241] __bread_gfp+0x13d/0x300 [ 1113.888892][T32241] btrfs_read_dev_one_super+0xb6/0x2a0 [ 1113.894719][T32241] btrfs_read_dev_super+0x6c/0xd0 [ 1113.899846][T32241] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 1113.905594][T32241] btrfs_get_bdev_and_sb+0xff/0x300 [ 1113.910809][T32241] open_fs_devices+0x68e/0xbd0 [ 1113.915791][T32241] ? find_fsid+0x2e0/0x2e0 [ 1113.920885][T32241] ? memmove_extent_buffer.cold+0x42/0x42 [ 1113.928022][T32241] btrfs_open_devices+0x147/0x170 [ 1113.933193][T32241] btrfs_mount_root+0x79a/0x1220 [ 1113.938429][T32241] ? btrfs_decode_error+0x70/0x70 [ 1113.943642][T32241] ? rcu_read_lock_sched_held+0x110/0x130 [ 1113.949614][T32241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.956148][T32241] ? vfs_parse_fs_string+0x111/0x170 [ 1113.961879][T32241] ? vfs_parse_fs_string+0x111/0x170 [ 1113.967783][T32241] ? rcu_read_lock_sched_held+0x110/0x130 [ 1113.974124][T32241] ? kfree+0x1fa/0x230 [ 1113.978388][T32241] ? vfs_parse_fs_string+0x116/0x170 [ 1113.984558][T32241] ? btrfs_decode_error+0x70/0x70 [ 1113.989685][T32241] legacy_get_tree+0xf2/0x200 [ 1113.994553][T32241] vfs_get_tree+0x123/0x450 [ 1113.999245][T32241] fc_mount+0x17/0xc0 [ 1114.003679][T32241] vfs_kern_mount.part.0+0xd8/0xf0 [ 1114.009238][T32241] vfs_kern_mount+0x40/0x60 [ 1114.014161][T32241] btrfs_mount+0x2b4/0x15e2 [ 1114.019582][T32241] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1114.026095][T32241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.032814][T32241] ? should_fail+0x1de/0x852 [ 1114.037591][T32241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1114.043759][T32241] ? btrfs_remount+0x11f0/0x11f0 [ 1114.049092][T32241] ? rcu_read_lock_sched_held+0x110/0x130 [ 1114.055346][T32241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.062062][T32241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.069192][T32241] ? vfs_parse_fs_string+0x111/0x170 [ 1114.074858][T32241] ? vfs_parse_fs_string+0x111/0x170 [ 1114.080171][T32241] ? rcu_read_lock_sched_held+0x110/0x130 [ 1114.085994][T32241] ? kfree+0x1fa/0x230 [ 1114.090080][T32241] ? vfs_parse_fs_string+0x116/0x170 [ 1114.095965][T32241] ? btrfs_remount+0x11f0/0x11f0 [ 1114.101104][T32241] legacy_get_tree+0xf2/0x200 [ 1114.105819][T32241] ? btrfs_remount+0x11f0/0x11f0 [ 1114.110953][T32241] ? legacy_get_tree+0xf2/0x200 [ 1114.115898][T32241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.122241][T32241] vfs_get_tree+0x123/0x450 [ 1114.126939][T32241] do_mount+0x1436/0x2c40 [ 1114.131289][T32241] ? copy_mount_string+0x40/0x40 [ 1114.136341][T32241] ? _copy_from_user+0xdd/0x150 04:54:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000fffffff60000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1114.141309][T32241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.147664][T32241] ? copy_mount_options+0x280/0x3a0 [ 1114.152886][T32241] ksys_mount+0xdb/0x150 [ 1114.157253][T32241] __x64_sys_mount+0xbe/0x150 [ 1114.162058][T32241] do_syscall_64+0x103/0x610 [ 1114.166781][T32241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1114.173054][T32241] RIP: 0033:0x45ac7a [ 1114.176969][T32241] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1114.198022][T32241] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1114.207413][T32241] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1114.215603][T32241] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1114.223765][T32241] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1114.231770][T32241] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1114.240211][T32241] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000fffffdfc0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1114.304843][T32248] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 04:54:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000fffffffe0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}]}, 0x2c}}, 0x0) 04:54:54 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:54 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff9900000040000100000001000009004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:54 executing program 4: select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x1}, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x63) 04:54:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 04:54:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000fcfdffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:54:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}]}, 0x2c}}, 0x0) [ 1114.561968][T32272] FAULT_INJECTION: forcing a failure. [ 1114.561968][T32272] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.584920][T32275] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 1114.601537][T32272] CPU: 0 PID: 32272 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1114.611463][T32272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.622263][T32272] Call Trace: [ 1114.625667][T32272] dump_stack+0x172/0x1f0 [ 1114.630288][T32272] should_fail.cold+0xa/0x15 [ 1114.635094][T32272] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1114.641284][T32272] ? ___might_sleep+0x163/0x280 [ 1114.646509][T32272] __should_failslab+0x121/0x190 [ 1114.652171][T32272] should_failslab+0x9/0x14 [ 1114.656806][T32272] __kmalloc+0x2dc/0x740 [ 1114.661073][T32272] ? close_fs_devices.part.0+0x219/0x790 [ 1114.667428][T32272] close_fs_devices.part.0+0x219/0x790 [ 1114.673261][T32272] btrfs_close_devices+0xa0/0x200 [ 1114.678668][T32272] btrfs_mount_root+0xf0c/0x1220 [ 1114.683807][T32272] ? btrfs_decode_error+0x70/0x70 [ 1114.689292][T32272] ? rcu_read_lock_sched_held+0x110/0x130 [ 1114.695380][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.702684][T32272] ? vfs_parse_fs_string+0x111/0x170 [ 1114.708801][T32272] ? vfs_parse_fs_string+0x111/0x170 [ 1114.715876][T32272] ? rcu_read_lock_sched_held+0x110/0x130 [ 1114.722571][T32272] ? kfree+0x1fa/0x230 [ 1114.727336][T32272] ? vfs_parse_fs_string+0x116/0x170 [ 1114.733652][T32272] ? btrfs_decode_error+0x70/0x70 [ 1114.739011][T32272] legacy_get_tree+0xf2/0x200 [ 1114.744007][T32272] vfs_get_tree+0x123/0x450 [ 1114.749221][T32272] fc_mount+0x17/0xc0 [ 1114.753413][T32272] vfs_kern_mount.part.0+0xd8/0xf0 [ 1114.758730][T32272] vfs_kern_mount+0x40/0x60 [ 1114.763514][T32272] btrfs_mount+0x2b4/0x15e2 [ 1114.769509][T32272] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1114.775357][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.782037][T32272] ? should_fail+0x1de/0x852 [ 1114.786912][T32272] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1114.793027][T32272] ? btrfs_remount+0x11f0/0x11f0 [ 1114.798355][T32272] ? rcu_read_lock_sched_held+0x110/0x130 [ 1114.804451][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.810949][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.817390][T32272] ? vfs_parse_fs_string+0x111/0x170 [ 1114.823146][T32272] ? vfs_parse_fs_string+0x111/0x170 [ 1114.829338][T32272] ? rcu_read_lock_sched_held+0x110/0x130 [ 1114.835601][T32272] ? kfree+0x1fa/0x230 [ 1114.839864][T32272] ? vfs_parse_fs_string+0x116/0x170 [ 1114.845490][T32272] ? btrfs_remount+0x11f0/0x11f0 [ 1114.850713][T32272] legacy_get_tree+0xf2/0x200 [ 1114.855940][T32272] ? btrfs_remount+0x11f0/0x11f0 [ 1114.861202][T32272] ? legacy_get_tree+0xf2/0x200 [ 1114.866880][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.873228][T32272] vfs_get_tree+0x123/0x450 [ 1114.877923][T32272] do_mount+0x1436/0x2c40 [ 1114.882377][T32272] ? copy_mount_string+0x40/0x40 [ 1114.887615][T32272] ? _copy_from_user+0xdd/0x150 [ 1114.893486][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.899822][T32272] ? copy_mount_options+0x280/0x3a0 [ 1114.905036][T32272] ksys_mount+0xdb/0x150 [ 1114.909331][T32272] __x64_sys_mount+0xbe/0x150 [ 1114.914039][T32272] do_syscall_64+0x103/0x610 [ 1114.919260][T32272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1114.925519][T32272] RIP: 0033:0x45ac7a [ 1114.930070][T32272] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1114.951162][T32272] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1114.961058][T32272] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1114.969588][T32272] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1114.978889][T32272] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1114.987513][T32272] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1114.998547][T32272] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}]}, 0x2c}}, 0x0) 04:54:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000f6ffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1115.024111][T32272] ------------[ cut here ]------------ [ 1115.032988][T32272] kernel BUG at fs/btrfs/volumes.c:1281! [ 1115.039765][T32272] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1115.046375][T32272] CPU: 0 PID: 32272 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190325 #10 [ 1115.056875][T32272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.068560][T32272] RIP: 0010:close_fs_devices.part.0+0x5c6/0x790 [ 1115.075775][T32272] Code: 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 21 7c c6 fe 0f 0b e8 1a 7c c6 fe <0f> 0b e8 13 7c c6 fe 0f 0b e9 16 ff ff ff e8 07 7c c6 fe 0f 0b e9 [ 1115.098631][T32272] RSP: 0018:ffff88808a327770 EFLAGS: 00010246 [ 1115.105807][T32272] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90010874000 [ 1115.129428][T32272] RDX: 0000000000040000 RSI: ffffffff82a9f456 RDI: 0000000000000282 [ 1115.138806][T32272] RBP: ffff88808a3277e0 R08: ffff8880492065c0 R09: ffffed1015d05bc8 [ 1115.147666][T32272] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff8880886db690 [ 1115.158098][T32272] R13: dffffc0000000000 R14: ffff8880597536c0 R15: ffff888085463240 [ 1115.167908][T32272] FS: 00007feecb62f700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1115.181058][T32272] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1115.190561][T32272] CR2: 0000000000000000 CR3: 000000008a6a7000 CR4: 00000000001406f0 [ 1115.200198][T32272] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1115.209765][T32272] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1115.218113][T32272] Call Trace: [ 1115.221774][T32272] btrfs_close_devices+0xa0/0x200 [ 1115.227682][T32272] btrfs_mount_root+0xf0c/0x1220 [ 1115.232660][T32272] ? btrfs_decode_error+0x70/0x70 [ 1115.237966][T32272] ? rcu_read_lock_sched_held+0x110/0x130 [ 1115.244942][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.252154][T32272] ? vfs_parse_fs_string+0x111/0x170 [ 1115.258154][T32272] ? vfs_parse_fs_string+0x111/0x170 [ 1115.263721][T32272] ? rcu_read_lock_sched_held+0x110/0x130 [ 1115.270630][T32272] ? kfree+0x1fa/0x230 [ 1115.275486][T32272] ? vfs_parse_fs_string+0x116/0x170 [ 1115.280871][T32272] ? btrfs_decode_error+0x70/0x70 [ 1115.286231][T32272] legacy_get_tree+0xf2/0x200 [ 1115.292263][T32272] vfs_get_tree+0x123/0x450 [ 1115.298358][T32272] fc_mount+0x17/0xc0 [ 1115.302873][T32272] vfs_kern_mount.part.0+0xd8/0xf0 [ 1115.308106][T32272] vfs_kern_mount+0x40/0x60 [ 1115.313258][T32272] btrfs_mount+0x2b4/0x15e2 [ 1115.318284][T32272] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1115.324385][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.331313][T32272] ? should_fail+0x1de/0x852 [ 1115.336239][T32272] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1115.342562][T32272] ? btrfs_remount+0x11f0/0x11f0 [ 1115.348104][T32272] ? rcu_read_lock_sched_held+0x110/0x130 [ 1115.354692][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.361103][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.368119][T32272] ? vfs_parse_fs_string+0x111/0x170 [ 1115.373662][T32272] ? vfs_parse_fs_string+0x111/0x170 [ 1115.379208][T32272] ? rcu_read_lock_sched_held+0x110/0x130 [ 1115.388014][T32272] ? kfree+0x1fa/0x230 [ 1115.392245][T32272] ? vfs_parse_fs_string+0x116/0x170 [ 1115.398833][T32272] ? btrfs_remount+0x11f0/0x11f0 [ 1115.404367][T32272] legacy_get_tree+0xf2/0x200 [ 1115.411126][T32272] ? btrfs_remount+0x11f0/0x11f0 [ 1115.417277][T32272] ? legacy_get_tree+0xf2/0x200 [ 1115.422909][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.435930][T32272] vfs_get_tree+0x123/0x450 [ 1115.442399][T32272] do_mount+0x1436/0x2c40 [ 1115.450190][T32272] ? copy_mount_string+0x40/0x40 [ 1115.456457][T32272] ? _copy_from_user+0xdd/0x150 [ 1115.463472][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.472090][T32272] ? copy_mount_options+0x280/0x3a0 [ 1115.479565][T32272] ksys_mount+0xdb/0x150 [ 1115.484245][T32272] __x64_sys_mount+0xbe/0x150 [ 1115.489318][T32272] do_syscall_64+0x103/0x610 [ 1115.494460][T32272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1115.500859][T32272] RIP: 0033:0x45ac7a [ 1115.504749][T32272] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1115.526471][T32272] RSP: 002b:00007feecb62ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1115.535126][T32272] RAX: ffffffffffffffda RBX: 00007feecb62eb40 RCX: 000000000045ac7a [ 1115.543432][T32272] RDX: 00007feecb62eae0 RSI: 0000000020000100 RDI: 00007feecb62eb00 [ 1115.551925][T32272] RBP: 0000000000000001 R08: 00007feecb62eb40 R09: 00007feecb62eae0 [ 1115.560368][T32272] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1115.569311][T32272] R13: 00000000004c69e5 R14: 00000000004dbfc8 R15: 0000000000000003 04:54:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) [ 1115.577964][T32272] Modules linked in: [ 1115.590961][T32275] kobject: 'loop2' (00000000f4e92411): kobject_uevent_env [ 1115.603427][T32272] ---[ end trace 208db6dc648d48a9 ]--- [ 1115.605110][ T3876] kobject: 'loop5' (000000009a84fdcf): kobject_uevent_env [ 1115.613059][T32275] kobject: 'loop2' (00000000f4e92411): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:54:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000feffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1115.618497][ T3876] kobject: 'loop5' (000000009a84fdcf): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1115.629168][T32272] RIP: 0010:close_fs_devices.part.0+0x5c6/0x790 [ 1115.647851][T32272] Code: 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 21 7c c6 fe 0f 0b e8 1a 7c c6 fe <0f> 0b e8 13 7c c6 fe 0f 0b e9 16 ff ff ff e8 07 7c c6 fe 0f 0b e9 [ 1115.673050][ T3876] kobject: 'loop2' (00000000f4e92411): kobject_uevent_env [ 1115.681516][ T3876] kobject: 'loop2' (00000000f4e92411): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1115.694081][T32272] RSP: 0018:ffff88808a327770 EFLAGS: 00010246 [ 1115.697869][ T3876] kobject: 'loop1' (000000009c9752f2): kobject_uevent_env [ 1115.715793][ T3876] kobject: 'loop1' (000000009c9752f2): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:54:55 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="803ff8ffffffffffffff2400e60100006cff990000004000010000000100000a004000000040000080000000000000206d5ec25a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:54:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1115.725049][T32272] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90010874000 [ 1115.732538][ T3876] kobject: 'loop4' (0000000036a0b4d0): kobject_uevent_env [ 1115.748362][ T3876] kobject: 'loop4' (0000000036a0b4d0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1115.750016][T32272] RDX: 0000000000040000 RSI: ffffffff82a9f456 RDI: 0000000000000282 [ 1115.773076][ T3876] kobject: 'loop3' (00000000e21a1e10): kobject_uevent_env [ 1115.773292][T32272] RBP: ffff88808a3277e0 R08: ffff8880492065c0 R09: ffffed1015d05bc8 [ 1115.785254][T32272] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff8880886db690 [ 1115.796098][T32294] kobject: 'loop1' (000000009c9752f2): kobject_uevent_env [ 1115.803383][T32272] R13: dffffc0000000000 R14: ffff8880597536c0 R15: ffff888085463240 [ 1115.808314][ T3876] kobject: 'loop3' (00000000e21a1e10): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1115.816971][T32272] FS: 00007feecb62f700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1115.828989][T32294] kobject: 'loop1' (000000009c9752f2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1115.837216][T32272] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1115.863830][ T3876] kobject: 'loop2' (00000000f4e92411): kobject_uevent_env [ 1115.873560][T32272] CR2: 000000c42ffa0200 CR3: 000000008a6a7000 CR4: 00000000001406e0 [ 1115.874125][ T3876] kobject: 'loop2' (00000000f4e92411): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1115.883129][T32272] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1115.895927][ T3876] kobject: 'loop3' (00000000e21a1e10): kobject_uevent_env [ 1115.901932][T32272] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1115.910259][ T3876] kobject: 'loop3' (00000000e21a1e10): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1115.918478][T32303] kobject: 'loop2' (00000000f4e92411): kobject_uevent_env [ 1115.934754][T32272] Kernel panic - not syncing: Fatal exception [ 1115.942528][T32272] Kernel Offset: disabled [ 1115.962443][T32272] Rebooting in 86400 seconds..