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", 0x226, 0xa1}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e040000", 0xb0, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000002000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000003000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:52 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc200", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0xa1}, {0x0, 0x0, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1569.936591] BTRFS error (device loop5): superblock checksum mismatch [ 1569.951425] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 7 scanned by syz-executor.4 (25039) 04:30:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/179, 0xb3, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/113, 0x71, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x51c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x2, 0x10000, 0x4, 0x0, 0x7fffffff, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000000)={&(0x7f00000003c0)=[0x10000, 0x8000, 0x33e, 0x80000001], 0x4}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000000408010800000000000b00000000000006000240000000000500030006000000fc211d518edf0b8eb746eae8e5bfd1687875a51bd010c084dd095ee09e7b0505444e4ab7a3a49ac11c1762b54e937cf93f1fef25601bbfca8c9ef5a77e9a6b847364a44810a00c9a28fddb992056996df0d47f177a5b65f17e4d78bb39d1aac823a08e28adc94b6769089669b518c530a2b84cd6a800000000000000000000000000000000bfc88c157d5f6b6cbb162699eade5524e6a75377e992170647361497f6b06a67f51103886719f44bb9ced9ca833cdd14df664145677b32"], 0x24}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0/file1\x00', 0x0, 0x100) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r6 = openat(r3, &(0x7f0000000400)='./file0/file0\x00', 0x220000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) mmap(&(0x7f000071c000/0x1000)=nil, 0x1000, 0x100000a, 0x1010, r2, 0x1a442000) ppoll(&(0x7f0000000700)=[{r2, 0x2000}, {0xffffffffffffffff, 0x9010}, {0xffffffffffffffff, 0x6}, {r0, 0x6000}], 0x4, &(0x7f0000000740), &(0x7f0000000780)={[0xc668]}, 0x8) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r6, 0xc00864bf, &(0x7f0000000080)) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x0, 0x803, 0x3000) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8936, &(0x7f0000000240)={@loopback, 0x55, r5}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000700000010805904a16c22082cbd5c00ffdbdf250a003b00", @ANYRES32=r5, @ANYBLOB="08005000000000de29d9c81200000000000000"], 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x4c080) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r8 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=@newlink={0x58, 0x10, 0x401, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x22220, 0x52a08}, [@IFLA_IFNAME={0x14, 0x3, 'pimreg\x00'}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x2f40f}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_IFALIAS={0x14, 0x14, 'batadv_slave_0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 1570.027279] BTRFS error (device loop5): open_ctree failed [ 1570.063864] BTRFS error (device loop5): superblock checksum mismatch 04:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000004000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1570.106141] BTRFS error (device loop5): open_ctree failed 04:30:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/179, 0xb3, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0xa1}, {&(0x7f0000010b00)="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", 0x108, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1570.278017] BTRFS info (device loop0): unrecognized mount option '0xffffffffffffffff' [ 1570.299665] BTRFS error (device loop0): open_ctree failed [ 1570.352350] gfs2: invalid mount option: dis [ 1570.356774] gfs2: can't parse mount arguments 04:30:53 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x5c02, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x51c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x2, 0x10000, 0x4, 0x0, 0x7fffffff, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000000)={&(0x7f00000003c0)=[0x10000, 0x8000, 0x33e, 0x80000001], 0x4}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000000408010800000000000b00000000000006000240000000000500030006000000fc211d518edf0b8eb746eae8e5bfd1687875a51bd010c084dd095ee09e7b0505444e4ab7a3a49ac11c1762b54e937cf93f1fef25601bbfca8c9ef5a77e9a6b847364a44810a00c9a28fddb992056996df0d47f177a5b65f17e4d78bb39d1aac823a08e28adc94b6769089669b518c530a2b84cd6a800000000000000000000000000000000bfc88c157d5f6b6cbb162699eade5524e6a75377e992170647361497f6b06a67f51103886719f44bb9ced9ca833cdd14df664145677b32"], 0x24}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) (async) r3 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0/file1\x00', 0x0, 0x100) (async, rerun: 32) r4 = socket$packet(0x11, 0x3, 0x300) (rerun: 32) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) (async) r6 = openat(r3, &(0x7f0000000400)='./file0/file0\x00', 0x220000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) (async) mmap(&(0x7f000071c000/0x1000)=nil, 0x1000, 0x100000a, 0x1010, r2, 0x1a442000) (async) ppoll(&(0x7f0000000700)=[{r2, 0x2000}, {0xffffffffffffffff, 0x9010}, {0xffffffffffffffff, 0x6}, {r0, 0x6000}], 0x4, &(0x7f0000000740), &(0x7f0000000780)={[0xc668]}, 0x8) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r6, 0xc00864bf, &(0x7f0000000080)) (async) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x0, 0x803, 0x3000) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8936, &(0x7f0000000240)={@loopback, 0x55, r5}) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000700000010805904a16c22082cbd5c00ffdbdf250a003b00", @ANYRES32=r5, @ANYBLOB="08005000000000de29d9c81200000000000000"], 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x4c080) (async) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) r8 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=@newlink={0x58, 0x10, 0x401, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x22220, 0x52a08}, [@IFLA_IFNAME={0x14, 0x3, 'pimreg\x00'}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x2f40f}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_IFALIAS={0x14, 0x14, 'batadv_slave_0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 04:30:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/113, 0x71, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000006000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/179, 0xb3, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0xa1}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e040000", 0xb0, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000010000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000003f000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x51c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x2, 0x10000, 0x4, 0x0, 0x7fffffff, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000000)={&(0x7f00000003c0)=[0x10000, 0x8000, 0x33e, 0x80000001], 0x4}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000000408010800000000000b00000000000006000240000000000500030006000000fc211d518edf0b8eb746eae8e5bfd1687875a51bd010c084dd095ee09e7b0505444e4ab7a3a49ac11c1762b54e937cf93f1fef25601bbfca8c9ef5a77e9a6b847364a44810a00c9a28fddb992056996df0d47f177a5b65f17e4d78bb39d1aac823a08e28adc94b6769089669b518c530a2b84cd6a800000000000000000000000000000000bfc88c157d5f6b6cbb162699eade5524e6a75377e992170647361497f6b06a67f51103886719f44bb9ced9ca833cdd14df664145677b32"], 0x24}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0/file1\x00', 0x0, 0x100) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r6 = openat(r3, &(0x7f0000000400)='./file0/file0\x00', 0x220000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) mmap(&(0x7f000071c000/0x1000)=nil, 0x1000, 0x100000a, 0x1010, r2, 0x1a442000) ppoll(&(0x7f0000000700)=[{r2, 0x2000}, {0xffffffffffffffff, 0x9010}, {0xffffffffffffffff, 0x6}, {r0, 0x6000}], 0x4, &(0x7f0000000740), &(0x7f0000000780)={[0xc668]}, 0x8) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r6, 0xc00864bf, &(0x7f0000000080)) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x0, 0x803, 0x3000) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8936, &(0x7f0000000240)={@loopback, 0x55, r5}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000700000010805904a16c22082cbd5c00ffdbdf250a003b00", @ANYRES32=r5, @ANYBLOB="08005000000000de29d9c81200000000000000"], 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x4c080) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r8 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=@newlink={0x58, 0x10, 0x401, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x22220, 0x52a08}, [@IFLA_IFNAME={0x14, 0x3, 'pimreg\x00'}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x2f40f}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_IFALIAS={0x14, 0x14, 'batadv_slave_0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x51c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x2, 0x10000, 0x4, 0x0, 0x7fffffff, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000000)={&(0x7f00000003c0)=[0x10000, 0x8000, 0x33e, 0x80000001], 0x4}) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000000408010800000000000b00000000000006000240000000000500030006000000fc211d518edf0b8eb746eae8e5bfd1687875a51bd010c084dd095ee09e7b0505444e4ab7a3a49ac11c1762b54e937cf93f1fef25601bbfca8c9ef5a77e9a6b847364a44810a00c9a28fddb992056996df0d47f177a5b65f17e4d78bb39d1aac823a08e28adc94b6769089669b518c530a2b84cd6a800000000000000000000000000000000bfc88c157d5f6b6cbb162699eade5524e6a75377e992170647361497f6b06a67f51103886719f44bb9ced9ca833cdd14df664145677b32"], 0x24}}, 0x0) (async) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) (async) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0/file1\x00', 0x0, 0x100) (async) socket$packet(0x11, 0x3, 0x300) (async) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00'}) (async) openat(r3, &(0x7f0000000400)='./file0/file0\x00', 0x220000, 0x0) (async) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) (async) mmap(&(0x7f000071c000/0x1000)=nil, 0x1000, 0x100000a, 0x1010, r2, 0x1a442000) (async) ppoll(&(0x7f0000000700)=[{r2, 0x2000}, {0xffffffffffffffff, 0x9010}, {0xffffffffffffffff, 0x6}, {r0, 0x6000}], 0x4, &(0x7f0000000740), &(0x7f0000000780)={[0xc668]}, 0x8) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r6, 0xc00864bf, &(0x7f0000000080)) (async) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) (async) socket(0x0, 0x803, 0x3000) (async) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8936, &(0x7f0000000240)={@loopback, 0x55, r5}) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000700000010805904a16c22082cbd5c00ffdbdf250a003b00", @ANYRES32=r5, @ANYBLOB="08005000000000de29d9c81200000000000000"], 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x4c080) (async) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) socket(0x10, 0x8000000803, 0x0) (async) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=@newlink={0x58, 0x10, 0x401, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x22220, 0x52a08}, [@IFLA_IFNAME={0x14, 0x3, 'pimreg\x00'}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x2f40f}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_IFALIAS={0x14, 0x14, 'batadv_slave_0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) (async) 04:30:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000040000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1570.563223] BTRFS info (device loop0): unrecognized mount option '0xffffffffffffffff' [ 1570.576349] BTRFS error (device loop0): open_ctree failed [ 1570.602940] BTRFS info (device loop0): unrecognized mount option '0xffffffffffffffff' [ 1570.653922] BTRFS error (device loop0): open_ctree failed [ 1570.808072] gfs2: invalid mount option: dis [ 1570.812830] gfs2: can't parse mount arguments 04:30:53 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x5d02, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:30:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/184, 0xb8, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fffffff6000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:53 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0xa1}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69b", 0x58, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000140)="6a31959c53417ceff0ea020d6ca5ae54ca00991ae10d492cfd2e6045a3121b8aadec93627409b34f2e7bbb3aae0e23439d6adfdac065caf7d4f315410e7c09a5cd92d9a4eeba1583a970a4951dae8bc09dd72c98a441a5956241367d1a965e50cfc017421883fe37cae3ac7542a36784e4c4d57706acfd04e8d065506750758fb37d48fe00f52a25f53bf268e2711ac786da8ca7a6d5ce20143ea5746d", 0x9d, 0x6}, {&(0x7f0000000280)="5c38cf9551", 0x5, 0x5}, {&(0x7f00000002c0)="d6bd34af01fdafe30edbc7da34ba4e8a6248", 0x12, 0xfff}, {&(0x7f0000000300)="b3006bb21431b32a49a18e42149340bbdbf70d5d614c6f2f07fbf72232420418c9275ee7b4139002cd2a8f50ee01db725d7a72c9eed09f7e974004cbd8a3e8376058f077ee6c0c30ea4a59a454f331daf40c274b155110a62c56785ab1e458fb20b3da69fb76c489324939ddd8babb4c7214cce203ec17da79ecbf119f1c9ad546ef186c5e3f302096e68e69b8b0", 0x8e, 0x8}, {&(0x7f00000003c0)='kU', 0x2, 0xffffffff}, {&(0x7f00000004c0)="6ab06c4f88830b25fccabd8a92a2612b635a1d3a9a7ecaa92511afe14077a652c908e70bb7252a9abd0c92f06b02865a10f09b45d4e841838ca4cb31b916fd86c76bc33e4f8a25f3180a2dbd320f62fb9f5a856faf4e872ce16e6aa07aac7aa58765811548af2e13a57fd01c2977d76dd226cc97b8e553154d9b30f41bd8ff3e3979412f056d1af22c92bfb33a08ca054609a6ea17bd6748631d58cb3d74e0044c258c30d6c2a317d03746645f8f61441852e93776209a0a07fed7f1d3a62d5f71f7081fc3d2b79f7a4675c6acb8856c68817a33e43e00878718e453632898f5bb", 0xe1, 0xffffffffffffffff}], 0x10, &(0x7f0000000400)={[{'ext4\x00'}, {'+\xcc'}, {'ext4\x00'}, {}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@euid_lt}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x125) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 04:30:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fffffdfc000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fffffffe000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) [ 1570.999775] BTRFS error (device loop4): superblock checksum mismatch [ 1571.013665] BTRFS error (device loop4): open_ctree failed [ 1571.035290] BTRFS error (device loop4): superblock checksum mismatch 04:30:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000140)="6a31959c53417ceff0ea020d6ca5ae54ca00991ae10d492cfd2e6045a3121b8aadec93627409b34f2e7bbb3aae0e23439d6adfdac065caf7d4f315410e7c09a5cd92d9a4eeba1583a970a4951dae8bc09dd72c98a441a5956241367d1a965e50cfc017421883fe37cae3ac7542a36784e4c4d57706acfd04e8d065506750758fb37d48fe00f52a25f53bf268e2711ac786da8ca7a6d5ce20143ea5746d", 0x9d, 0x6}, {&(0x7f0000000280)="5c38cf9551", 0x5, 0x5}, {&(0x7f00000002c0)="d6bd34af01fdafe30edbc7da34ba4e8a6248", 0x12, 0xfff}, {&(0x7f0000000300)="b3006bb21431b32a49a18e42149340bbdbf70d5d614c6f2f07fbf72232420418c9275ee7b4139002cd2a8f50ee01db725d7a72c9eed09f7e974004cbd8a3e8376058f077ee6c0c30ea4a59a454f331daf40c274b155110a62c56785ab1e458fb20b3da69fb76c489324939ddd8babb4c7214cce203ec17da79ecbf119f1c9ad546ef186c5e3f302096e68e69b8b0", 0x8e, 0x8}, {&(0x7f00000003c0)='kU', 0x2, 0xffffffff}, {&(0x7f00000004c0)="6ab06c4f88830b25fccabd8a92a2612b635a1d3a9a7ecaa92511afe14077a652c908e70bb7252a9abd0c92f06b02865a10f09b45d4e841838ca4cb31b916fd86c76bc33e4f8a25f3180a2dbd320f62fb9f5a856faf4e872ce16e6aa07aac7aa58765811548af2e13a57fd01c2977d76dd226cc97b8e553154d9b30f41bd8ff3e3979412f056d1af22c92bfb33a08ca054609a6ea17bd6748631d58cb3d74e0044c258c30d6c2a317d03746645f8f61441852e93776209a0a07fed7f1d3a62d5f71f7081fc3d2b79f7a4675c6acb8856c68817a33e43e00878718e453632898f5bb", 0xe1, 0xffffffffffffffff}], 0x10, &(0x7f0000000400)={[{'ext4\x00'}, {'+\xcc'}, {'ext4\x00'}, {}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@euid_lt}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x125) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (async) chdir(&(0x7f0000000100)='./file0\x00') (async) syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000140)="6a31959c53417ceff0ea020d6ca5ae54ca00991ae10d492cfd2e6045a3121b8aadec93627409b34f2e7bbb3aae0e23439d6adfdac065caf7d4f315410e7c09a5cd92d9a4eeba1583a970a4951dae8bc09dd72c98a441a5956241367d1a965e50cfc017421883fe37cae3ac7542a36784e4c4d57706acfd04e8d065506750758fb37d48fe00f52a25f53bf268e2711ac786da8ca7a6d5ce20143ea5746d", 0x9d, 0x6}, {&(0x7f0000000280)="5c38cf9551", 0x5, 0x5}, {&(0x7f00000002c0)="d6bd34af01fdafe30edbc7da34ba4e8a6248", 0x12, 0xfff}, {&(0x7f0000000300)="b3006bb21431b32a49a18e42149340bbdbf70d5d614c6f2f07fbf72232420418c9275ee7b4139002cd2a8f50ee01db725d7a72c9eed09f7e974004cbd8a3e8376058f077ee6c0c30ea4a59a454f331daf40c274b155110a62c56785ab1e458fb20b3da69fb76c489324939ddd8babb4c7214cce203ec17da79ecbf119f1c9ad546ef186c5e3f302096e68e69b8b0", 0x8e, 0x8}, {&(0x7f00000003c0)='kU', 0x2, 0xffffffff}, {&(0x7f00000004c0)="6ab06c4f88830b25fccabd8a92a2612b635a1d3a9a7ecaa92511afe14077a652c908e70bb7252a9abd0c92f06b02865a10f09b45d4e841838ca4cb31b916fd86c76bc33e4f8a25f3180a2dbd320f62fb9f5a856faf4e872ce16e6aa07aac7aa58765811548af2e13a57fd01c2977d76dd226cc97b8e553154d9b30f41bd8ff3e3979412f056d1af22c92bfb33a08ca054609a6ea17bd6748631d58cb3d74e0044c258c30d6c2a317d03746645f8f61441852e93776209a0a07fed7f1d3a62d5f71f7081fc3d2b79f7a4675c6acb8856c68817a33e43e00878718e453632898f5bb", 0xe1, 0xffffffffffffffff}], 0x10, &(0x7f0000000400)={[{'ext4\x00'}, {'+\xcc'}, {'ext4\x00'}, {}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@euid_lt}]}) (async) open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x125) (async) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) fstat(0xffffffffffffffff, 0x0) (async) setresuid(0x0, 0x0, 0x0) (async) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) (async) fcntl$setstatus(r0, 0x4, 0x44000) (async) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) (async) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) (async) 04:30:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000ffffffff000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/184, 0xb8, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1571.127601] BTRFS error (device loop4): open_ctree failed 04:30:54 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x5f01, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:30:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) 04:30:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000002000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:54 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0xa1}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69b", 0x58, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/184, 0xb8, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (async) chdir(&(0x7f0000000100)='./file0\x00') (async) syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000140)="6a31959c53417ceff0ea020d6ca5ae54ca00991ae10d492cfd2e6045a3121b8aadec93627409b34f2e7bbb3aae0e23439d6adfdac065caf7d4f315410e7c09a5cd92d9a4eeba1583a970a4951dae8bc09dd72c98a441a5956241367d1a965e50cfc017421883fe37cae3ac7542a36784e4c4d57706acfd04e8d065506750758fb37d48fe00f52a25f53bf268e2711ac786da8ca7a6d5ce20143ea5746d", 0x9d, 0x6}, {&(0x7f0000000280)="5c38cf9551", 0x5, 0x5}, {&(0x7f00000002c0)="d6bd34af01fdafe30edbc7da34ba4e8a6248", 0x12, 0xfff}, {&(0x7f0000000300)="b3006bb21431b32a49a18e42149340bbdbf70d5d614c6f2f07fbf72232420418c9275ee7b4139002cd2a8f50ee01db725d7a72c9eed09f7e974004cbd8a3e8376058f077ee6c0c30ea4a59a454f331daf40c274b155110a62c56785ab1e458fb20b3da69fb76c489324939ddd8babb4c7214cce203ec17da79ecbf119f1c9ad546ef186c5e3f302096e68e69b8b0", 0x8e, 0x8}, {&(0x7f00000003c0)='kU', 0x2, 0xffffffff}, {&(0x7f00000004c0)="6ab06c4f88830b25fccabd8a92a2612b635a1d3a9a7ecaa92511afe14077a652c908e70bb7252a9abd0c92f06b02865a10f09b45d4e841838ca4cb31b916fd86c76bc33e4f8a25f3180a2dbd320f62fb9f5a856faf4e872ce16e6aa07aac7aa58765811548af2e13a57fd01c2977d76dd226cc97b8e553154d9b30f41bd8ff3e3979412f056d1af22c92bfb33a08ca054609a6ea17bd6748631d58cb3d74e0044c258c30d6c2a317d03746645f8f61441852e93776209a0a07fed7f1d3a62d5f71f7081fc3d2b79f7a4675c6acb8856c68817a33e43e00878718e453632898f5bb", 0xe1, 0xffffffffffffffff}], 0x10, &(0x7f0000000400)={[{'ext4\x00'}, {'+\xcc'}, {'ext4\x00'}, {}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@euid_lt}]}) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x125) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) fstat(0xffffffffffffffff, 0x0) (async) setresuid(0x0, 0x0, 0x0) (async) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) (async) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) [ 1571.292294] gfs2: invalid mount option: dis [ 1571.296723] gfs2: can't parse mount arguments 04:30:54 executing program 1: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x81, 0x88, 0x20, 0x80, 0x0, 0x8, 0x80, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x2}, 0x400, 0x8001, 0x6, 0x3, 0x5, 0x2, 0x6, 0x0, 0x7fff}, 0x0, 0xa, r1, 0xb) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x67, 0x2, {0x10, 0x0, 0x2}}, 0x14) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={@private2, 0x77}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0xcb1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1e10, 0x9bcf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="7379b696a605e49b4faa1c3396e4a0696e83b99a64458411274bc44e087be2d406c10034d8699725113bf50b727cfd6deecdb959a4c4f1de9bf384ff7fb1583539d0bfc687a1b9c74613bdc99cf53e454667dab0cdd31ac54ce5ba"], 0x4) dup(r3) ioctl$sock_bt_hci(r2, 0x400448cb, 0x0) 04:30:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) 04:30:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/186, 0xba, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000003000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1571.444617] BTRFS info (device loop0): unrecognized mount option '0xffffffffffffffff' 04:30:54 executing program 1: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x81, 0x88, 0x20, 0x80, 0x0, 0x8, 0x80, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x2}, 0x400, 0x8001, 0x6, 0x3, 0x5, 0x2, 0x6, 0x0, 0x7fff}, 0x0, 0xa, r1, 0xb) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x67, 0x2, {0x10, 0x0, 0x2}}, 0x14) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={@private2, 0x77}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0xcb1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1e10, 0x9bcf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="7379b696a605e49b4faa1c3396e4a0696e83b99a64458411274bc44e087be2d406c10034d8699725113bf50b727cfd6deecdb959a4c4f1de9bf384ff7fb1583539d0bfc687a1b9c74613bdc99cf53e454667dab0cdd31ac54ce5ba"], 0x4) dup(r3) ioctl$sock_bt_hci(r2, 0x400448cb, 0x0) getpgid(0x0) (async) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (async) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) (async) rmdir(0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x81, 0x88, 0x20, 0x80, 0x0, 0x8, 0x80, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x2}, 0x400, 0x8001, 0x6, 0x3, 0x5, 0x2, 0x6, 0x0, 0x7fff}, 0x0, 0xa, r1, 0xb) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x67, 0x2, {0x10, 0x0, 0x2}}, 0x14) (async) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) (async) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={@private2, 0x77}) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0xcb1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1e10, 0x9bcf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) write$binfmt_misc(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="7379b696a605e49b4faa1c3396e4a0696e83b99a64458411274bc44e087be2d406c10034d8699725113bf50b727cfd6deecdb959a4c4f1de9bf384ff7fb1583539d0bfc687a1b9c74613bdc99cf53e454667dab0cdd31ac54ce5ba"], 0x4) (async) dup(r3) (async) ioctl$sock_bt_hci(r2, 0x400448cb, 0x0) (async) 04:30:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000004000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1571.544231] BTRFS error (device loop0): open_ctree failed [ 1571.711372] gfs2: invalid mount option: dis [ 1571.715988] gfs2: can't parse mount arguments 04:30:54 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x6000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:30:54 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0xa1}, {&(0x7f0000010b00), 0x0, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000006000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:54 executing program 1: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (async, rerun: 64) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) (rerun: 64) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x81, 0x88, 0x20, 0x80, 0x0, 0x8, 0x80, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x2}, 0x400, 0x8001, 0x6, 0x3, 0x5, 0x2, 0x6, 0x0, 0x7fff}, 0x0, 0xa, r1, 0xb) (async) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x67, 0x2, {0x10, 0x0, 0x2}}, 0x14) (async, rerun: 32) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) (async, rerun: 32) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={@private2, 0x77}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0xcb1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1e10, 0x9bcf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="7379b696a605e49b4faa1c3396e4a0696e83b99a64458411274bc44e087be2d406c10034d8699725113bf50b727cfd6deecdb959a4c4f1de9bf384ff7fb1583539d0bfc687a1b9c74613bdc99cf53e454667dab0cdd31ac54ce5ba"], 0x4) (async) dup(r3) ioctl$sock_bt_hci(r2, 0x400448cb, 0x0) 04:30:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/186, 0xba, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000010000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:54 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x0fF\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1b, 0xdc, 0x6, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x7ff}, 0x18000, 0xef02, 0x3, 0x8, 0xaa, 0x3, 0x0, 0x0, 0xda, 0x0, 0x5}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r4 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="0500000000000000bc100002000000000fa0000000000000"], 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000300)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\xac\xa2Jr\xc4\xe8\xf4~j\t\x03\xe7\x1c\xb3B\xc9%\x9b\x9f\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xb7\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xec\xff^9P\xee\x8aG\xdd2\x00\x00\x00\x00/([\x96\xb1>\x06\x0ep2\x93e\x02\xd5\xed\'Eu\x91\xffT\xbc\xa4O[\x03}') socket$kcm(0x21, 0x0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x7, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="62c451e764dc78d5c6bfc4342ab94cda063c8e5b6dbc135d"], &(0x7f0000000480)='GPL\x00', 0xbbc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x0, 0x7b1, 0xfffffff9}, 0x10}, 0x80) gettid() 04:30:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1571.930591] BTRFS error (device loop4): superblock checksum mismatch [ 1571.937333] BTRFS error (device loop4): open_ctree failed 04:30:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000030000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/186, 0xba, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1572.014125] BTRFS error (device loop4): superblock checksum mismatch [ 1572.050058] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (25346) 04:30:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000060000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1572.144882] BTRFS error (device loop4): open_ctree failed [ 1572.297102] gfs2: invalid mount option: dis [ 1572.305088] gfs2: can't parse mount arguments 04:30:55 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x6002, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:30:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:55 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0xa1}, {&(0x7f0000010b00), 0x0, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000200000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/187, 0xbb, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000003f0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000400000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1572.525842] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 7 scanned by syz-executor.4 (25390) [ 1572.535411] BTRFS error (device loop5): superblock checksum mismatch [ 1572.593556] device wlan1 entered promiscuous mode [ 1572.610430] BTRFS error (device loop5): open_ctree failed [ 1572.614977] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1572.623730] BTRFS error (device loop5): superblock checksum mismatch 04:30:55 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async, rerun: 64) r2 = socket$kcm(0x29, 0x2, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x0fF\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1b, 0xdc, 0x6, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x7ff}, 0x18000, 0xef02, 0x3, 0x8, 0xaa, 0x3, 0x0, 0x0, 0xda, 0x0, 0x5}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r4 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="0500000000000000bc100002000000000fa0000000000000"], 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000300)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\xac\xa2Jr\xc4\xe8\xf4~j\t\x03\xe7\x1c\xb3B\xc9%\x9b\x9f\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xb7\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xec\xff^9P\xee\x8aG\xdd2\x00\x00\x00\x00/([\x96\xb1>\x06\x0ep2\x93e\x02\xd5\xed\'Eu\x91\xffT\xbc\xa4O[\x03}') (rerun: 32) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x7, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="62c451e764dc78d5c6bfc4342ab94cda063c8e5b6dbc135d"], &(0x7f0000000480)='GPL\x00', 0xbbc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x0, 0x7b1, 0xfffffff9}, 0x10}, 0x80) gettid() 04:30:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/187, 0xbb, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000200000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:55 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0xa1}, {&(0x7f0000010b00), 0x0, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1572.691265] BTRFS error (device loop5): open_ctree failed 04:30:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000002000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1572.794038] device wlan1 left promiscuous mode [ 1572.918612] BTRFS info (device loop0): unrecognized mount option '0xffffffffffffffff' [ 1572.973819] gfs2: invalid mount option: dis [ 1572.976952] BTRFS error (device loop0): open_ctree failed [ 1572.995298] gfs2: can't parse mount arguments 04:30:56 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x6101, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:30:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000001000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/187, 0xbb, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:56 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x0fF\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1b, 0xdc, 0x6, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x7ff}, 0x18000, 0xef02, 0x3, 0x8, 0xaa, 0x3, 0x0, 0x0, 0xda, 0x0, 0x5}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r4 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="0500000000000000bc100002000000000fa0000000000000"], 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000300)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\xac\xa2Jr\xc4\xe8\xf4~j\t\x03\xe7\x1c\xb3B\xc9%\x9b\x9f\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xb7\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xec\xff^9P\xee\x8aG\xdd2\x00\x00\x00\x00/([\x96\xb1>\x06\x0ep2\x93e\x02\xd5\xed\'Eu\x91\xffT\xbc\xa4O[\x03}') socket$kcm(0x21, 0x0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x7, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="62c451e764dc78d5c6bfc4342ab94cda063c8e5b6dbc135d"], &(0x7f0000000480)='GPL\x00', 0xbbc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x0, 0x7b1, 0xfffffff9}, 0x10}, 0x80) gettid() 04:30:56 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0xa1}, {&(0x7f0000010b00)}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1573.458249] BTRFS info (device loop0): unrecognized mount option '0xffffffffffffffff' [ 1573.524095] BTRFS error (device loop0): open_ctree failed 04:30:56 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (rerun: 32) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x0fF\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1b, 0xdc, 0x6, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x7ff}, 0x18000, 0xef02, 0x3, 0x8, 0xaa, 0x3, 0x0, 0x0, 0xda, 0x0, 0x5}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) (async) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r4 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x9) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="0500000000000000bc100002000000000fa0000000000000"], 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000300)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\xac\xa2Jr\xc4\xe8\xf4~j\t\x03\xe7\x1c\xb3B\xc9%\x9b\x9f\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xb7\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xec\xff^9P\xee\x8aG\xdd2\x00\x00\x00\x00/([\x96\xb1>\x06\x0ep2\x93e\x02\xd5\xed\'Eu\x91\xffT\xbc\xa4O[\x03}') socket$kcm(0x21, 0x0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x7, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="62c451e764dc78d5c6bfc4342ab94cda063c8e5b6dbc135d"], &(0x7f0000000480)='GPL\x00', 0xbbc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x0, 0x7b1, 0xfffffff9}, 0x10}, 0x80) (async, rerun: 64) gettid() (rerun: 64) 04:30:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:56 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010b00)}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000004000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1573.684237] device wlan1 entered promiscuous mode [ 1573.689538] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1573.767252] BTRFS info (device loop0): unrecognized mount option '0xffffffffffffffff' [ 1573.800125] BTRFS error (device loop0): open_ctree failed [ 1573.910531] gfs2: invalid mount option: dis [ 1573.915315] gfs2: can't parse mount arguments 04:30:56 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:56 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x6703, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:30:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000006000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1574.159055] BTRFS info (device loop0): unrecognized mount option '0xffffffffffffffff' 04:30:57 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x0fF\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1b, 0xdc, 0x6, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x7ff}, 0x18000, 0xef02, 0x3, 0x8, 0xaa, 0x3, 0x0, 0x0, 0xda, 0x0, 0x5}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r4 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="0500000000000000bc100002000000000fa0000000000000"], 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000300)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\xac\xa2Jr\xc4\xe8\xf4~j\t\x03\xe7\x1c\xb3B\xc9%\x9b\x9f\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xb7\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xec\xff^9P\xee\x8aG\xdd2\x00\x00\x00\x00/([\x96\xb1>\x06\x0ep2\x93e\x02\xd5\xed\'Eu\x91\xffT\xbc\xa4O[\x03}') socket$kcm(0x21, 0x0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x7, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="62c451e764dc78d5c6bfc4342ab94cda063c8e5b6dbc135d"], &(0x7f0000000480)='GPL\x00', 0xbbc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x0, 0x7b1, 0xfffffff9}, 0x10}, 0x80) gettid() 04:30:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000010000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1574.215439] BTRFS error (device loop0): open_ctree failed [ 1574.223279] device wlan1 entered promiscuous mode [ 1574.228595] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1574.248635] device wlan1 left promiscuous mode 04:30:57 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1574.332995] gfs2: invalid mount option: dis [ 1574.353959] gfs2: can't parse mount arguments [ 1574.513109] BTRFS error (device loop0): superblock checksum mismatch [ 1574.558122] BTRFS error (device loop0): open_ctree failed 04:30:57 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000003f000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:57 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x6800, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:30:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, 0x0) 04:30:57 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc200", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1574.718012] device wlan1 entered promiscuous mode [ 1574.723151] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1574.736970] device wlan1 left promiscuous mode 04:30:57 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000040000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fffffff6000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1574.949258] BTRFS error (device loop0): superblock checksum mismatch [ 1574.979574] BTRFS error (device loop0): open_ctree failed 04:30:58 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:58 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc200", 0x12c, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0xa1}, {&(0x7f0000010b00), 0x0, 0x101ea0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fffffdfc000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, 0x0) 04:30:58 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12c, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:58 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x6c00, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) [ 1575.195110] device wlan1 entered promiscuous mode [ 1575.214275] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1575.218235] gfs2: invalid mount option: dis [ 1575.225495] gfs2: can't parse mount arguments 04:30:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) (fail_nth: 1) 04:30:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fffffffe000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, 0x0) 04:30:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fcfdffff000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000f6ffffff000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1575.495056] BTRFS error (device loop0): superblock checksum mismatch [ 1575.502158] BTRFS warning (device ): duplicate device /dev/loop5 devid 1 generation 7 scanned by syz-executor.5 (25590) [ 1575.563911] BTRFS error (device loop0): open_ctree failed 04:30:58 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x8000000000000000}, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000002080)=0x60, 0x10000870) 04:30:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000feffffff000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:30:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:30:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000200000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1576.550485] gfs2: invalid mount option: dis [ 1576.554917] gfs2: can't parse mount arguments 04:31:00 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x7000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:00 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000001000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000020000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:00 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) (async) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x8000000000000000}, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000002080)=0x60, 0x10000870) 04:31:00 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000010000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1577.650107] syz-executor.5 (25624): drop_caches: 2 [ 1577.663187] syz-executor.5 (25624): drop_caches: 2 [ 1577.674978] gfs2: invalid mount option: dis [ 1577.682582] gfs2: can't parse mount arguments 04:31:00 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x7400, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000020000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:00 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x8000000000000000}, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000002080)=0x60, 0x10000870) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) (async) openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x8000000000000000}, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendfile(r1, r0, &(0x7f0000002080)=0x60, 0x10000870) (async) 04:31:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000030000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:00 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000040000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1577.981366] syz-executor.5 (25706): drop_caches: 2 [ 1578.000242] syz-executor.5 (25712): drop_caches: 2 [ 1578.017128] syz-executor.5 (25706): drop_caches: 2 04:31:01 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1578.039312] syz-executor.5 (25712): drop_caches: 2 04:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) (fail_nth: 1) 04:31:01 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000060000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1578.210203] FAULT_INJECTION: forcing a failure. [ 1578.210203] name failslab, interval 1, probability 0, space 0, times 0 [ 1578.274236] CPU: 0 PID: 25731 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1578.282143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1578.291495] Call Trace: [ 1578.294089] dump_stack+0x1fc/0x2ef [ 1578.297719] should_fail.cold+0xa/0xf [ 1578.301526] ? setup_fault_attr+0x200/0x200 [ 1578.305852] ? lock_acquire+0x170/0x3c0 [ 1578.309835] __should_failslab+0x115/0x180 [ 1578.314083] should_failslab+0x5/0x10 [ 1578.317889] __kmalloc+0x2ab/0x3c0 [ 1578.321604] ? __se_sys_memfd_create+0xf8/0x440 [ 1578.326271] __se_sys_memfd_create+0xf8/0x440 [ 1578.330767] ? memfd_file_seals_ptr+0x150/0x150 [ 1578.335439] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1578.340809] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1578.345849] ? do_syscall_64+0x21/0x620 [ 1578.349826] do_syscall_64+0xf9/0x620 [ 1578.353634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1578.358833] RIP: 0033:0x7f33ad629279 [ 1578.362550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1578.381449] RSP: 002b:00007f33abf9df28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1578.389161] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f33ad629279 [ 1578.396430] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f33ad6822c4 [ 1578.403707] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007f33abf9e1d0 [ 1578.410976] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1578.418250] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 04:31:01 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x7a00, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000100000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:01 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1578.566813] gfs2: invalid mount option: dis [ 1578.582131] gfs2: can't parse mount arguments 04:31:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x80003, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001440)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000480002000005000004000000000000000000000000000000000000002c000c0000000000000072d4"], 0x78}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', r4, 0x29, 0x20, 0x9, 0x8, 0x2a, @dev={0xfe, 0x80, '\x00', 0x11}, @private0, 0x8, 0x701, 0x3, 0x69d}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl2\x00', r6, 0x4, 0xa8, 0x6, 0xae3, 0x12, @loopback, @local, 0x1, 0x8, 0x6, 0x20}}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000e9000000000000000000c1030000030000002004000000000000800200000000000000000000808000005003000050030000500300ff4f030000500300000300000000f7ff0000000000fe8000000074cb8af296109f0f0000bbff020000800000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e640000006e65747063693000000000000000000000000000000000000000000000fe00000000000000800000001d000000a2000000000000000000000000000050028002000000000100000000000000000064f700000000000000005001686173686c696d69740000000000000001000000000000000002010000027465616d5f736c6176655f3100080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000faff000000000000000000008000000000400000000000000001000000000000000000000000000000000000000000000000000000000000a160c480e474f2ac000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000090000000000a90c000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000400000000000020b61a000800000000000000000000000000005800686173686c696d69740000000000000000000000000000f3ffffff00000173797a6b616c6c657231000000000000000000000000000084000000000000000000000005000000a600000000000000005f0200000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000969a2a6b0000000000000000000000040000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000212f00000000000000000000feffffff"], 0x1) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x3f, 0x4, 0x1, 0x0, 0x0, 0x7fff, 0x42, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000400), 0xd}, 0x224, 0xffffffffffffffff, 0x9, 0x5, 0x8000, 0x9, 0x6, 0x0, 0xfffffffc, 0x0, 0xfffffffffffffffb}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r7 = socket$can_bcm(0x1d, 0x2, 0x2) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d, r9}, 0x10, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="01000000cd0d00000000000000002000", @ANYRES64=r7, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r9, @ANYBLOB="0000000001"], 0x80}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@getqdisc={0x40, 0x26, 0x200, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r9, {0xf, 0xfff2}, {0x8, 0x10}, {0xffe0, 0xfff1}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20008800) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 04:31:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) (fail_nth: 2) 04:31:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000003f0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1578.729322] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 04:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1578.775043] FAULT_INJECTION: forcing a failure. [ 1578.775043] name failslab, interval 1, probability 0, space 0, times 0 04:31:01 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000400000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1578.857128] CPU: 1 PID: 25763 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1578.865038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1578.874396] Call Trace: [ 1578.876995] dump_stack+0x1fc/0x2ef [ 1578.880635] should_fail.cold+0xa/0xf [ 1578.884446] ? setup_fault_attr+0x200/0x200 [ 1578.888781] ? lock_acquire+0x170/0x3c0 [ 1578.892779] __should_failslab+0x115/0x180 [ 1578.897021] should_failslab+0x5/0x10 [ 1578.900824] kmem_cache_alloc+0x277/0x370 [ 1578.904980] ? shmem_destroy_callback+0xb0/0xb0 [ 1578.909745] shmem_alloc_inode+0x18/0x40 [ 1578.913811] ? shmem_destroy_callback+0xb0/0xb0 [ 1578.918483] alloc_inode+0x5d/0x180 [ 1578.922109] new_inode+0x1d/0xf0 [ 1578.925477] shmem_get_inode+0x96/0x8d0 [ 1578.929466] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1578.934312] shmem_file_setup+0x61/0x90 [ 1578.938286] __se_sys_memfd_create+0x26b/0x440 [ 1578.942870] ? memfd_file_seals_ptr+0x150/0x150 [ 1578.947539] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 04:31:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffff60000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1578.952901] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1578.957918] ? do_syscall_64+0x21/0x620 [ 1578.961896] do_syscall_64+0xf9/0x620 [ 1578.965713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1578.970909] RIP: 0033:0x7f33ad629279 [ 1578.974622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1578.993527] RSP: 002b:00007f33abf9df28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 04:31:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1579.001240] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f33ad629279 [ 1579.008508] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f33ad6822c4 [ 1579.015945] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007f33abf9e1d0 [ 1579.023223] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1579.030489] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 04:31:02 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x7c03, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffdfc0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:02 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) (async) r1 = socket$inet6(0xa, 0x80003, 0x6) (async) r2 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) (async) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) (async) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001440)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000480002000005000004000000000000000000000000000000000000002c000c0000000000000072d4"], 0x78}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', r4, 0x29, 0x20, 0x9, 0x8, 0x2a, @dev={0xfe, 0x80, '\x00', 0x11}, @private0, 0x8, 0x701, 0x3, 0x69d}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl2\x00', r6, 0x4, 0xa8, 0x6, 0xae3, 0x12, @loopback, @local, 0x1, 0x8, 0x6, 0x20}}) (async) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x3f, 0x4, 0x1, 0x0, 0x0, 0x7fff, 0x42, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000400), 0xd}, 0x224, 0xffffffffffffffff, 0x9, 0x5, 0x8000, 0x9, 0x6, 0x0, 0xfffffffc, 0x0, 0xfffffffffffffffb}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r7 = socket$can_bcm(0x1d, 0x2, 0x2) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000140), 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d, r9}, 0x10, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="01000000cd0d00000000000000002000", @ANYRES64=r7, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r9, @ANYBLOB="0000000001"], 0x80}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@getqdisc={0x40, 0x26, 0x200, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r9, {0xf, 0xfff2}, {0x8, 0x10}, {0xffe0, 0xfff1}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20008800) (async) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 04:31:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffffe0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:02 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1580.023657] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 04:31:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000ffffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1580.225680] gfs2: invalid mount option: dis [ 1580.237075] gfs2: can't parse mount arguments 04:31:03 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x8a02, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xeffd, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:03 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) (async) r1 = socket$inet6(0xa, 0x80003, 0x6) (async) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001440)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000480002000005000004000000000000000000000000000000000000002c000c0000000000000072d4"], 0x78}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', r4, 0x29, 0x20, 0x9, 0x8, 0x2a, @dev={0xfe, 0x80, '\x00', 0x11}, @private0, 0x8, 0x701, 0x3, 0x69d}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl2\x00', r6, 0x4, 0xa8, 0x6, 0xae3, 0x12, @loopback, @local, 0x1, 0x8, 0x6, 0x20}}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) (async, rerun: 32) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x3f, 0x4, 0x1, 0x0, 0x0, 0x7fff, 0x42, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000400), 0xd}, 0x224, 0xffffffffffffffff, 0x9, 0x5, 0x8000, 0x9, 0x6, 0x0, 0xfffffffc, 0x0, 0xfffffffffffffffb}, 0x0, 0x4, 0xffffffffffffffff, 0x2) (async, rerun: 32) r7 = socket$can_bcm(0x1d, 0x2, 0x2) (async) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d, r9}, 0x10, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="01000000cd0d00000000000000002000", @ANYRES64=r7, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r9, @ANYBLOB="0000000001"], 0x80}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@getqdisc={0x40, 0x26, 0x200, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r9, {0xf, 0xfff2}, {0x8, 0x10}, {0xffe0, 0xfff1}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20008800) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 04:31:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000020000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdef, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:03 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000030000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000040000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1580.785599] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 1580.985123] gfs2: invalid mount option: dis [ 1581.005048] gfs2: can't parse mount arguments 04:31:04 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x8c01, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000060000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:04 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1581.493581] gfs2: invalid mount option: dis [ 1581.505222] gfs2: can't parse mount arguments [ 1581.528651] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 04:31:04 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03001500055bd25a80648c63940d3424fc60100010400a000a00053582c137153e370800038047020000d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) futex(&(0x7f0000000040), 0xb, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socket$kcm(0x11, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x300) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @local, 0x9}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xf7bd}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x7fb80000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000280)=@xdp={0x2c, 0x18, 0x0, 0x9}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)="0a373effa03b1fbcbde106902809f76bb2fe95508a020cf234a6c7b77ed0eece776acd7eff85ca60abf8c4d57b1497bac4b558873dbfcb1bd58137e89a3da40438c04982edd0e47e1ecd534c58895a10f2c82667", 0x54}], 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="c8000000000000001401000000000000fd36174d78ca3e5344a5aeb9bb61669c270d18d93d011f65bfa88d4fc4cf55fcd38e32d7660af22171cc1d34ad5a8bf243b7d1c69e2af758654690c4ff906ee78ca16284e5ffbce8dc70af99191d296574cd07b83bc572b9df2d7fb4465655add9eaba9ec06fed29cc49549036b43fb27597061cf2adb6f952e93a60e404db7b6cb9c2c434d2e3b08a02c06b9263f178d29a1ecc279398072c75018f34aa71dc7803310d4922b55e92e5997daa9819078175e25e2f5e2400f80000000000000004010000fffbffff1c17ae9a93145af4c4a6778a4adc83b47756753698a9efca0e2c040bd271d3340890c32458c368910acb2facea9f01546df575961439efb5dca85633443446fa909b3a429a61e3d107692afecdcdd8b4cdc95189104242d1b278c9a85c8e7f10b3effcebd81758ad8dc269fdd497854889fe77eb17bde8da51ccda8309434b940deb82b39d3782f15164cd0860c063bcdb97d95c8cf2105f7ad85da5caac9769161397b6114fe7ddc532ac2aa08457a0e58b2467715424b23e819b70f853694ac25f02bf5b60f092cf709003c7bb9e929ce5da8bb6679a6793db2d7427c6cdf4218b000000000000700000000000000014010000040000007500ec461d38629e3440af98144f71fe2d4e6d680c99b718da6bd67bf755187082f9d53b744b835bb833c61971e0e8db62270e402cf9d2dab4705d0725b91e6f4f2767ef24f42afb198dff4a5b5ed666ebea103d732ab2569da461f8ad485b5520000000000000003c2420390200000052dfb3bfd5e095cc4bcc000000000000cec57d22c0b2965191fa29465785552c081c443f6415713461bfa2a97105dc544afcb2f1da9e3696ce1cca3e780ddb861aea1e023baccbc0e07485b2e385d56a3679565f9e9fabac1a2f7fb9d25bbdaad8ad96348e89d20d"], 0x250}, 0x4000810) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0xaf, 0xea, 0x0, 0x401, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000400), 0xf}, 0x0, 0x100, 0x3, 0x3, 0x3, 0x81, 0x5, 0x0, 0x61, 0x0, 0x8}, r2, 0x2, r0, 0x8) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) 04:31:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000100000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:04 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:04 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x8e02, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000300000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000600000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:04 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:05 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03001500055bd25a80648c63940d3424fc60100010400a000a00053582c137153e370800038047020000d1bd", 0x33fe0}], 0x1}, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket$kcm(0xa, 0x802, 0x88) (async) futex(&(0x7f0000000040), 0xb, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socket$kcm(0x11, 0x0, 0x0) (async) socket$kcm(0x11, 0x0, 0x300) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @local, 0x9}, 0x80, 0x0}, 0x8000) (async) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xf7bd}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x7fb80000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000280)=@xdp={0x2c, 0x18, 0x0, 0x9}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)="0a373effa03b1fbcbde106902809f76bb2fe95508a020cf234a6c7b77ed0eece776acd7eff85ca60abf8c4d57b1497bac4b558873dbfcb1bd58137e89a3da40438c04982edd0e47e1ecd534c58895a10f2c82667", 0x54}], 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="c8000000000000001401000000000000fd36174d78ca3e5344a5aeb9bb61669c270d18d93d011f65bfa88d4fc4cf55fcd38e32d7660af22171cc1d34ad5a8bf243b7d1c69e2af758654690c4ff906ee78ca16284e5ffbce8dc70af99191d296574cd07b83bc572b9df2d7fb4465655add9eaba9ec06fed29cc49549036b43fb27597061cf2adb6f952e93a60e404db7b6cb9c2c434d2e3b08a02c06b9263f178d29a1ecc279398072c75018f34aa71dc7803310d4922b55e92e5997daa9819078175e25e2f5e2400f80000000000000004010000fffbffff1c17ae9a93145af4c4a6778a4adc83b47756753698a9efca0e2c040bd271d3340890c32458c368910acb2facea9f01546df575961439efb5dca85633443446fa909b3a429a61e3d107692afecdcdd8b4cdc95189104242d1b278c9a85c8e7f10b3effcebd81758ad8dc269fdd497854889fe77eb17bde8da51ccda8309434b940deb82b39d3782f15164cd0860c063bcdb97d95c8cf2105f7ad85da5caac9769161397b6114fe7ddc532ac2aa08457a0e58b2467715424b23e819b70f853694ac25f02bf5b60f092cf709003c7bb9e929ce5da8bb6679a6793db2d7427c6cdf4218b000000000000700000000000000014010000040000007500ec461d38629e3440af98144f71fe2d4e6d680c99b718da6bd67bf755187082f9d53b744b835bb833c61971e0e8db62270e402cf9d2dab4705d0725b91e6f4f2767ef24f42afb198dff4a5b5ed666ebea103d732ab2569da461f8ad485b5520000000000000003c2420390200000052dfb3bfd5e095cc4bcc000000000000cec57d22c0b2965191fa29465785552c081c443f6415713461bfa2a97105dc544afcb2f1da9e3696ce1cca3e780ddb861aea1e023baccbc0e07485b2e385d56a3679565f9e9fabac1a2f7fb9d25bbdaad8ad96348e89d20d"], 0x250}, 0x4000810) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0xaf, 0xea, 0x0, 0x401, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000400), 0xf}, 0x0, 0x100, 0x3, 0x3, 0x3, 0x81, 0x5, 0x0, 0x61, 0x0, 0x8}, r2, 0x2, r0, 0x8) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) 04:31:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000002000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000003f00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1582.146345] BTRFS error (device loop5): superblock checksum mismatch [ 1582.184266] BTRFS error (device loop5): open_ctree failed 04:31:05 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03001500055bd25a80648c63940d3424fc60100010400a000a00053582c137153e370800038047020000d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) (async) futex(&(0x7f0000000040), 0xb, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socket$kcm(0x11, 0x0, 0x0) (async) socket$kcm(0x11, 0x0, 0x300) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @local, 0x9}, 0x80, 0x0}, 0x8000) (async) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xf7bd}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x7fb80000) (async, rerun: 32) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000280)=@xdp={0x2c, 0x18, 0x0, 0x9}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)="0a373effa03b1fbcbde106902809f76bb2fe95508a020cf234a6c7b77ed0eece776acd7eff85ca60abf8c4d57b1497bac4b558873dbfcb1bd58137e89a3da40438c04982edd0e47e1ecd534c58895a10f2c82667", 0x54}], 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="c8000000000000001401000000000000fd36174d78ca3e5344a5aeb9bb61669c270d18d93d011f65bfa88d4fc4cf55fcd38e32d7660af22171cc1d34ad5a8bf243b7d1c69e2af758654690c4ff906ee78ca16284e5ffbce8dc70af99191d296574cd07b83bc572b9df2d7fb4465655add9eaba9ec06fed29cc49549036b43fb27597061cf2adb6f952e93a60e404db7b6cb9c2c434d2e3b08a02c06b9263f178d29a1ecc279398072c75018f34aa71dc7803310d4922b55e92e5997daa9819078175e25e2f5e2400f80000000000000004010000fffbffff1c17ae9a93145af4c4a6778a4adc83b47756753698a9efca0e2c040bd271d3340890c32458c368910acb2facea9f01546df575961439efb5dca85633443446fa909b3a429a61e3d107692afecdcdd8b4cdc95189104242d1b278c9a85c8e7f10b3effcebd81758ad8dc269fdd497854889fe77eb17bde8da51ccda8309434b940deb82b39d3782f15164cd0860c063bcdb97d95c8cf2105f7ad85da5caac9769161397b6114fe7ddc532ac2aa08457a0e58b2467715424b23e819b70f853694ac25f02bf5b60f092cf709003c7bb9e929ce5da8bb6679a6793db2d7427c6cdf4218b000000000000700000000000000014010000040000007500ec461d38629e3440af98144f71fe2d4e6d680c99b718da6bd67bf755187082f9d53b744b835bb833c61971e0e8db62270e402cf9d2dab4705d0725b91e6f4f2767ef24f42afb198dff4a5b5ed666ebea103d732ab2569da461f8ad485b5520000000000000003c2420390200000052dfb3bfd5e095cc4bcc000000000000cec57d22c0b2965191fa29465785552c081c443f6415713461bfa2a97105dc544afcb2f1da9e3696ce1cca3e780ddb861aea1e023baccbc0e07485b2e385d56a3679565f9e9fabac1a2f7fb9d25bbdaad8ad96348e89d20d"], 0x250}, 0x4000810) (async, rerun: 32) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0xaf, 0xea, 0x0, 0x401, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000400), 0xf}, 0x0, 0x100, 0x3, 0x3, 0x3, 0x81, 0x5, 0x0, 0x61, 0x0, 0x8}, r2, 0x2, r0, 0x8) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) [ 1582.212062] BTRFS error (device loop5): superblock checksum mismatch [ 1582.279457] BTRFS error (device loop5): open_ctree failed 04:31:05 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xa000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000004000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:05 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:05 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1582.471481] gfs2: invalid mount option: dis [ 1582.476058] gfs2: can't parse mount arguments 04:31:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000020000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1582.628523] BTRFS error (device loop0): superblock checksum mismatch [ 1582.635822] BTRFS error (device loop0): open_ctree failed 04:31:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000010000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:05 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1582.827332] BTRFS error (device loop4): superblock checksum mismatch [ 1582.850389] BTRFS error (device loop4): open_ctree failed [ 1582.866121] BTRFS error (device loop4): superblock checksum mismatch [ 1582.947612] BTRFS error (device loop4): open_ctree failed 04:31:06 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xae00, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000020000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:06 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1583.070770] gfs2: invalid mount option: dis [ 1583.076178] gfs2: can't parse mount arguments 04:31:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000030000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000040000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1583.285006] BTRFS error (device loop5): superblock checksum mismatch [ 1583.298339] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 7 scanned by syz-executor.0 (26055) [ 1583.326266] BTRFS error (device loop5): open_ctree failed 04:31:06 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1583.372655] BTRFS error (device loop5): superblock checksum mismatch 04:31:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000060000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1583.432852] BTRFS error (device loop5): open_ctree failed 04:31:06 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xb002, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000100000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:06 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1583.742243] gfs2: invalid mount option: dis [ 1583.746685] gfs2: can't parse mount arguments 04:31:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000003f0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xeffdffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000400000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1583.909518] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 7 scanned by syz-executor.4 (26114) 04:31:07 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xb400, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffff60000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:07 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1584.187539] gfs2: invalid mount option: dis [ 1584.192286] gfs2: can't parse mount arguments 04:31:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdef, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffdfc0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:07 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffffe0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:07 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xb503, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fcfdffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1584.669101] gfs2: invalid mount option: dis [ 1584.673739] gfs2: can't parse mount arguments 04:31:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000f6ffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000feffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000002000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1585.013896] BTRFS error (device loop5): superblock checksum mismatch [ 1585.035016] BTRFS error (device loop5): open_ctree failed 04:31:08 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xb803, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:08 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000010000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1585.159645] gfs2: invalid mount option: dis [ 1585.167075] gfs2: can't parse mount arguments 04:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7ffffffff000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000200000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000100000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1585.424210] BTRFS error (device loop4): superblock checksum mismatch [ 1585.464055] BTRFS error (device loop4): open_ctree failed [ 1585.480997] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (26281) [ 1585.520756] BTRFS error (device loop4): superblock checksum mismatch [ 1585.622305] BTRFS error (device loop4): open_ctree failed 04:31:08 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xbb03, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000200000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:08 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000", 0xd8, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf0ffffff7f0000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1585.771477] gfs2: invalid mount option: dis [ 1585.782266] gfs2: can't parse mount arguments 04:31:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000300000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000400000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1585.923643] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 7 scanned by syz-executor.4 (26315) [ 1585.937078] BTRFS error (device loop5): superblock checksum mismatch 04:31:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1585.984690] BTRFS error (device loop5): open_ctree failed [ 1586.014311] BTRFS error (device loop5): superblock checksum mismatch 04:31:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1586.076674] BTRFS error (device loop5): open_ctree failed 04:31:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000600000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:09 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000", 0xd8, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:09 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xd200, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1586.371419] gfs2: invalid mount option: dis [ 1586.375847] gfs2: can't parse mount arguments 04:31:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000001000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1586.500049] BTRFS error (device loop5): superblock checksum mismatch [ 1586.511474] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 7 scanned by syz-executor.4 (26375) 04:31:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000003f00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1586.596624] BTRFS error (device loop5): open_ctree failed [ 1586.624614] BTRFS error (device loop5): superblock checksum mismatch 04:31:09 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000", 0xd8, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000004000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1586.719392] BTRFS error (device loop5): open_ctree failed 04:31:09 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000", 0xd8, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1586.879384] BTRFS error (device loop4): superblock checksum mismatch [ 1586.900650] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (26421) [ 1586.964349] BTRFS error (device loop4): open_ctree failed 04:31:10 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xd203, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fffffff600000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200", 0xdd, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000", 0xd8, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1587.105024] gfs2: invalid mount option: dis [ 1587.114822] gfs2: can't parse mount arguments 04:31:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fffffdfc00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1587.200622] BTRFS error (device loop0): superblock checksum mismatch 04:31:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fffffffe00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1587.248059] BTRFS error (device loop0): open_ctree failed [ 1587.270310] BTRFS error (device loop5): superblock checksum mismatch [ 1587.280050] BTRFS error (device loop5): open_ctree failed 04:31:10 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1587.335948] BTRFS error (device loop5): superblock checksum mismatch [ 1587.398283] BTRFS error (device loop5): open_ctree failed [ 1587.476805] BTRFS error (device loop5): superblock checksum mismatch [ 1587.504959] BTRFS error (device loop5): open_ctree failed [ 1587.520270] BTRFS error (device loop5): superblock checksum mismatch [ 1587.552020] BTRFS error (device loop5): open_ctree failed 04:31:10 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xd301, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000ffffffff00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200", 0xdd, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1587.787455] gfs2: invalid mount option: dis [ 1587.792114] gfs2: can't parse mount arguments 04:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xeffdffffffffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000200000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000300000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1587.973417] BTRFS error (device loop5): superblock checksum mismatch [ 1588.008516] BTRFS warning (device ): duplicate device /dev/loop4 devid 1 generation 7 scanned by syz-executor.4 (26515) 04:31:11 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000", 0xd8, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1588.024219] BTRFS error (device loop5): open_ctree failed [ 1588.058810] BTRFS error (device loop5): superblock checksum mismatch [ 1588.158272] BTRFS error (device loop5): open_ctree failed [ 1588.205260] BTRFS error (device loop5): superblock checksum mismatch [ 1588.273438] BTRFS error (device loop5): open_ctree failed 04:31:11 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xd600, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:11 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000400000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:11 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1588.451063] gfs2: invalid mount option: dis [ 1588.455495] gfs2: can't parse mount arguments 04:31:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000600000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000001000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1588.636303] BTRFS error (device loop5): superblock checksum mismatch [ 1588.644629] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (26570) 04:31:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffdef, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:11 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1588.697395] BTRFS error (device loop5): open_ctree failed [ 1588.724213] BTRFS error (device loop5): superblock checksum mismatch [ 1588.805289] BTRFS error (device loop5): open_ctree failed [ 1588.813391] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1588.953905] BTRFS error (device loop0): superblock checksum mismatch [ 1588.967064] BTRFS error (device loop0): open_ctree failed 04:31:12 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xe200, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000006000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:12 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000", 0xcf, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:12 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1589.148427] gfs2: invalid mount option: dis [ 1589.153167] gfs2: can't parse mount arguments 04:31:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000020000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000003f000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1589.428970] BTRFS warning (device ): duplicate device /dev/loop4 devid 1 generation 7 scanned by syz-executor.4 (26635) [ 1589.456926] BTRFS error (device loop0): superblock checksum mismatch 04:31:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8502000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1589.484231] BTRFS error (device loop0): open_ctree failed [ 1589.493514] BTRFS error (device loop0): superblock checksum mismatch [ 1589.526857] BTRFS error (device loop0): open_ctree failed [ 1589.823941] gfs2: invalid mount option: dis [ 1589.828805] gfs2: can't parse mount arguments 04:31:12 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xe401, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000040000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:12 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8503000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:12 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000020000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8504000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1590.013703] BTRFS error (device loop5): superblock checksum mismatch [ 1590.032697] BTRFS warning (device ): duplicate device /dev/loop4 devid 1 generation 7 scanned by syz-executor.4 (26685) 04:31:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8506000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000200000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1590.114212] BTRFS error (device loop5): open_ctree failed 04:31:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:13 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1590.201592] BTRFS error (device loop5): superblock checksum mismatch [ 1590.233466] BTRFS error (device loop5): open_ctree failed [ 1590.405509] BTRFS error (device loop4): superblock checksum mismatch [ 1590.416877] BTRFS error (device loop4): open_ctree failed 04:31:13 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xe402, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8507000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000100000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:13 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:13 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1590.623011] gfs2: invalid mount option: dis [ 1590.629383] gfs2: can't parse mount arguments 04:31:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8510000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000200000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1590.735809] BTRFS error (device loop5): superblock checksum mismatch 04:31:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500030000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1590.781301] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (26751) [ 1590.802699] BTRFS error (device loop5): open_ctree failed [ 1590.814797] BTRFS error (device loop5): superblock checksum mismatch 04:31:13 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000", 0xda, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000300000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1590.888617] BTRFS error (device loop5): open_ctree failed [ 1591.015602] BTRFS error (device loop5): superblock checksum mismatch [ 1591.022759] BTRFS error (device loop5): open_ctree failed [ 1591.032581] BTRFS error (device loop5): superblock checksum mismatch [ 1591.077936] BTRFS error (device loop5): open_ctree failed 04:31:14 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xe403, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500060000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000400000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:14 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:14 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000", 0xda, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1591.292204] gfs2: invalid mount option: dis [ 1591.296636] gfs2: can't parse mount arguments 04:31:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500070000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000600000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1591.465686] BTRFS error (device loop5): superblock checksum mismatch 04:31:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500200000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1591.510414] BTRFS error (device loop5): open_ctree failed 04:31:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000001000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1591.593102] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (26812) 04:31:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85003f0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1591.645421] BTRFS error (device loop5): superblock checksum mismatch [ 1591.741780] BTRFS error (device loop5): open_ctree failed [ 1591.761687] BTRFS error (device loop5): superblock checksum mismatch [ 1591.827897] BTRFS error (device loop5): open_ctree failed 04:31:15 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xedc0, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:15 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000", 0xda, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000003f00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500400000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:15 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1592.034785] gfs2: invalid mount option: dis [ 1592.039521] gfs2: can't parse mount arguments 04:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fdef0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000004000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1592.189134] BTRFS error (device loop5): superblock checksum mismatch [ 1592.218959] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (26873) 04:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85effd0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1592.268372] BTRFS error (device loop5): open_ctree failed [ 1592.276391] BTRFS error (device loop5): superblock checksum mismatch 04:31:15 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffff600000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:15 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1592.358211] BTRFS error (device loop5): open_ctree failed [ 1592.516035] BTRFS error (device loop4): superblock checksum mismatch [ 1592.552542] BTRFS error (device loop4): open_ctree failed 04:31:15 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf002, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x11000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffdfc00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:15 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:15 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1592.771303] gfs2: invalid mount option: dis [ 1592.775733] gfs2: can't parse mount arguments 04:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500002000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffffe00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1592.906733] BTRFS error (device loop4): superblock checksum mismatch [ 1592.940907] BTRFS error (device loop4): open_ctree failed 04:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000001000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1592.965187] BTRFS error (device loop4): superblock checksum mismatch [ 1592.979896] BTRFS error (device loop4): open_ctree failed 04:31:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fcfdffff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:16 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1593.230569] BTRFS error (device loop4): superblock checksum mismatch [ 1593.239118] BTRFS error (device loop4): open_ctree failed 04:31:16 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf003, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:16 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000f6ffffff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000002000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:16 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1593.451452] gfs2: invalid mount option: dis [ 1593.455992] gfs2: can't parse mount arguments 04:31:16 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) 04:31:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000feffffff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000003000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1593.640735] BTRFS error (device loop5): superblock checksum mismatch [ 1593.669878] BTRFS error (device loop5): open_ctree failed 04:31:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1593.698859] BTRFS error (device loop5): superblock checksum mismatch 04:31:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000020000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:16 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) [ 1593.751574] BTRFS error (device loop5): open_ctree failed 04:31:17 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf601, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000004000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000100000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:17 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100100, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:17 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) [ 1594.163316] gfs2: invalid mount option: dis [ 1594.167819] gfs2: can't parse mount arguments 04:31:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000002000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000006000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:17 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1594.368393] BTRFS error (device loop5): superblock checksum mismatch 04:31:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000001000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1594.432918] BTRFS error (device loop5): open_ctree failed [ 1594.471769] BTRFS error (device loop5): superblock checksum mismatch 04:31:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000007000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1594.569838] BTRFS error (device loop5): open_ctree failed [ 1594.596077] BTRFS error (device loop0): superblock checksum mismatch [ 1594.643757] BTRFS error (device loop0): open_ctree failed 04:31:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000010000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000002000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:17 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf603, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:17 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:17 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1594.912307] gfs2: invalid mount option: dis [ 1594.920082] gfs2: can't parse mount arguments 04:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000003f000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000003000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000040000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1595.069186] BTRFS error (device loop0): superblock checksum mismatch [ 1595.088244] BTRFS error (device loop0): open_ctree failed 04:31:18 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1595.165487] BTRFS error (device loop5): superblock checksum mismatch [ 1595.217240] BTRFS warning (device ): duplicate device /dev/loop4 devid 1 generation 7 scanned by syz-executor.4 (27107) 04:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffdef000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000004000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:18 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1595.267856] BTRFS error (device loop5): open_ctree failed [ 1595.379565] BTRFS error (device loop0): superblock checksum mismatch [ 1595.414690] BTRFS error (device loop0): open_ctree failed [ 1595.523576] BTRFS error (device loop4): superblock checksum mismatch [ 1595.559912] BTRFS error (device loop4): open_ctree failed 04:31:18 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf901, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffff6000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000006000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:18 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000", 0xdb}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:18 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1595.727856] gfs2: invalid mount option: dis [ 1595.732401] gfs2: can't parse mount arguments 04:31:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000010000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffdfc000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:18 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000003f000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffffe000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1595.984855] BTRFS error (device loop5): superblock checksum mismatch 04:31:19 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1596.078257] BTRFS error (device loop5): open_ctree failed 04:31:19 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xff0f, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000040000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85effdffff000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:19 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:19 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1596.424629] gfs2: invalid mount option: dis [ 1596.429351] gfs2: can't parse mount arguments 04:31:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fcfdffff000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffff6000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:19 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f6ffffff000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffdfc000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85feffffff000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1596.672858] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (27236) [ 1596.685163] BTRFS error (device loop0): superblock checksum mismatch [ 1596.747865] BTRFS error (device loop0): open_ctree failed 04:31:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x20000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffffe000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000200000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1597.064204] gfs2: invalid mount option: dis [ 1597.068996] gfs2: can't parse mount arguments 04:31:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000ffffffff000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:20 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500f0ffffff7f00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000001000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x40000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:20 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000020000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1597.968338] gfs2: invalid mount option: dis [ 1597.972780] gfs2: can't parse mount arguments 04:31:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000004000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500007ffffffff0000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:21 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000006000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:21 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:21 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xe0000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000010000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:21 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000010000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000030000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:22 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000020000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000060000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1599.207368] BTRFS error (device loop4): superblock checksum mismatch [ 1599.239177] BTRFS error (device loop4): open_ctree failed [ 1599.272159] BTRFS error (device loop5): superblock checksum mismatch [ 1599.331779] BTRFS error (device loop5): open_ctree failed 04:31:22 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x100000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:22 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000030000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000200000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:22 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000003f0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:22 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000040000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000400000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000060000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1600.109295] BTRFS error (device loop5): superblock checksum mismatch [ 1600.141595] BTRFS error (device loop5): open_ctree failed 04:31:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1600.191855] BTRFS error (device loop5): superblock checksum mismatch [ 1600.257455] BTRFS error (device loop5): open_ctree failed 04:31:23 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x1fffff, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:23 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001000000000000000000000100000000", 0xd9, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000200000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000070000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000002000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000100000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000001000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1600.950288] BTRFS error (device loop5): superblock checksum mismatch [ 1600.965531] BTRFS error (device loop5): open_ctree failed 04:31:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000003f0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1601.002105] BTRFS error (device loop5): superblock checksum mismatch [ 1601.038603] BTRFS error (device loop5): open_ctree failed 04:31:24 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x400000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000400000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000002000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:24 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffffffffffdef0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000003000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffff60000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:24 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000004000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:25 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x1000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffdfc0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000006000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:25 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffffe0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:25 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000010000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x2000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85effdffffffffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000003f000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:26 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500020000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000040000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500030000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:26 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500040000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:27 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x3000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fffffff6000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:27 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500060000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fffffdfc000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fffffffe000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:27 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4d91bffa, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500070000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fcfdffff000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:28 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x4000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:28 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000f6ffffff000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500100000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000feffffff000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:28 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/109, 0x6d, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000200000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x5000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000600000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:29 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000001000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000700000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000020000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500002000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:29 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:30 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x6000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000010000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500003f00000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:30 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000020000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500004000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000030000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:30 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000", 0x37, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:31 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x7000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000040000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500fdef00000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:31 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000", 0x37, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500effd00000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000060000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:31 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000", 0x37, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000002000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1608.388158] ieee802154 phy0 wpan0: encryption failed: -22 [ 1608.393804] ieee802154 phy1 wpan1: encryption failed: -22 04:31:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000020000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x8000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000100000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000010000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000", 0x52, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000003f0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000020000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000030000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000", 0x37, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000400000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000040000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x9000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffff60000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000", 0x5e, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfabf914d, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000060000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:32 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000", 0x37, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffdfc0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000070000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000", 0x37, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000100000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xb030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000003f0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffffe0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:33 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000ffffffff0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000020000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000400000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:34 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x10000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000030000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500fffffdef0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88d", 0x2f, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:34 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500fffffff60000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000040000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500fffffdfc0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88d", 0x2f, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500fffffffe0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000060000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:35 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x16010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500effdffff0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:35 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000", 0x4c, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000100000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88d", 0x2f, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000300000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500fcfdffff0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:35 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000600000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500f6ffffff0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:36 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x1f000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500feffffff0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:36 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000002000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000003f00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000f0ffffff7f000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000004000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:36 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:37 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x20000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000010000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000002000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050", 0x53, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:37 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07", 0x49, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000200000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000020000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffe00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000007ffffffff00000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:37 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:38 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x20010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000010000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000100000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:38 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000020000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000200000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:38 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000030000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:39 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x23000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000300000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000040000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d070000000000", 0x4e, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:39 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000060000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000400000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:39 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07", 0x49, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000600000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:40 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x2f010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000100000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000700000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:40 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000003f0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000001000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:40 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000003f00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:41 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x32020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000400000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:41 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000004000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500fffffffffffffdef00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffff60000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:41 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffdfc0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:42 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x3e010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffff600000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffffe0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:42 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fcfdffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffdfc00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000f6ffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffffe00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1619.735337] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 04:31:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000ffffffff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:42 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x3e030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:42 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:31:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000feffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000002000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500effdffffffffffff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000010000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:43 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:31:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000200000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:43 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x3f000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000300000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000100000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:43 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:31:44 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000400000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000200000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000600000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:44 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x48000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000700000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000300000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500001000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000400000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000600000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000003000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000001000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:45 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x4c000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10010000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000006000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000003f00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:45 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x19bcd69f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000004000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000007000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000020000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000003f000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:46 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x4d91bffa, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000fffffff600000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000040000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:46 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03001500055bd25a80648c63940d3424fc60100010400a000a00053582c137153e370800038047020000d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) futex(&(0x7f0000000040), 0xb, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socket$kcm(0x11, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x300) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @local, 0x9}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0xf7bd}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x7fb80000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000280)=@xdp={0x2c, 0x18, 0x0, 0x9}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)="0a373effa03b1fbcbde106902809f76bb2fe95508a020cf234a6c7b77ed0eece776acd7eff85ca60abf8c4d57b1497bac4b558873dbfcb1bd58137e89a3da40438c04982edd0e47e1ecd534c58895a10f2c82667", 0x54}], 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x250}, 0x4000810) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0xaf, 0xea, 0x0, 0x401, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000400), 0xf}, 0x0, 0x100, 0x3, 0x3, 0x3, 0x81, 0x5, 0x0, 0x61, 0x0, 0x8}, r2, 0x2, r0, 0x8) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) 04:31:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000fffffdfc00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000fdef000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:31:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000fffffffe00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000effd000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:47 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x4e020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000ffffffff00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:31:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000020000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:47 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 1) 04:31:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000200000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1624.838490] FAULT_INJECTION: forcing a failure. [ 1624.838490] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.863387] CPU: 0 PID: 28763 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1624.871303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1624.880663] Call Trace: [ 1624.883262] dump_stack+0x1fc/0x2ef [ 1624.886905] should_fail.cold+0xa/0xf [ 1624.890713] ? setup_fault_attr+0x200/0x200 [ 1624.895038] ? lock_acquire+0x170/0x3c0 [ 1624.899021] __should_failslab+0x115/0x180 [ 1624.903260] should_failslab+0x5/0x10 [ 1624.907067] __kmalloc+0x2ab/0x3c0 [ 1624.910607] ? __se_sys_memfd_create+0xf8/0x440 [ 1624.915286] __se_sys_memfd_create+0xf8/0x440 [ 1624.919789] ? memfd_file_seals_ptr+0x150/0x150 [ 1624.924464] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1624.929833] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1624.934856] ? do_syscall_64+0x21/0x620 [ 1624.938838] do_syscall_64+0xf9/0x620 [ 1624.942643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.947831] RIP: 0033:0x7f048e04d279 [ 1624.951549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1624.970448] RSP: 002b:00007f048c9c1f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1624.978155] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f048e04d279 04:31:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000300000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000200000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000100000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1624.985423] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f048e0a62c4 [ 1624.992696] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f048c9c21d0 [ 1624.999964] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1625.007242] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 04:31:48 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x4f000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000400000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000200000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:48 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 2) 04:31:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000300000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000600000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000400000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1625.783774] FAULT_INJECTION: forcing a failure. [ 1625.783774] name failslab, interval 1, probability 0, space 0, times 0 04:31:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1625.854684] CPU: 1 PID: 28804 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1625.862606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1625.871961] Call Trace: [ 1625.874552] dump_stack+0x1fc/0x2ef [ 1625.878187] should_fail.cold+0xa/0xf [ 1625.881997] ? setup_fault_attr+0x200/0x200 [ 1625.886313] ? lock_acquire+0x170/0x3c0 [ 1625.890287] __should_failslab+0x115/0x180 [ 1625.894706] should_failslab+0x5/0x10 [ 1625.898498] kmem_cache_alloc+0x277/0x370 [ 1625.902636] ? shmem_destroy_callback+0xb0/0xb0 [ 1625.907302] shmem_alloc_inode+0x18/0x40 [ 1625.911372] ? shmem_destroy_callback+0xb0/0xb0 [ 1625.916027] alloc_inode+0x5d/0x180 [ 1625.919640] new_inode+0x1d/0xf0 [ 1625.923012] shmem_get_inode+0x96/0x8d0 [ 1625.926980] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1625.931813] shmem_file_setup+0x61/0x90 [ 1625.935774] __se_sys_memfd_create+0x26b/0x440 [ 1625.940343] ? memfd_file_seals_ptr+0x150/0x150 [ 1625.945001] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1625.950359] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1625.955362] ? do_syscall_64+0x21/0x620 [ 1625.959324] do_syscall_64+0xf9/0x620 [ 1625.963120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1625.968299] RIP: 0033:0x7f048e04d279 [ 1625.972005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1625.990977] RSP: 002b:00007f048c9c1f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 04:31:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000001000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1625.998674] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f048e04d279 [ 1626.005932] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f048e0a62c4 [ 1626.013189] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f048c9c21d0 [ 1626.020446] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1626.027703] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 04:31:49 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x51010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000600000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:49 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) 04:31:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000003000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 1) 04:31:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000700000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000006000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000001000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1626.621492] FAULT_INJECTION: forcing a failure. [ 1626.621492] name failslab, interval 1, probability 0, space 0, times 0 04:31:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1626.680221] CPU: 1 PID: 28842 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1626.688126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1626.697482] Call Trace: [ 1626.700089] dump_stack+0x1fc/0x2ef [ 1626.703732] should_fail.cold+0xa/0xf [ 1626.707545] ? setup_fault_attr+0x200/0x200 [ 1626.711876] ? lock_acquire+0x170/0x3c0 [ 1626.715861] __should_failslab+0x115/0x180 [ 1626.720101] should_failslab+0x5/0x10 [ 1626.723899] __kmalloc+0x2ab/0x3c0 [ 1626.727436] ? __se_sys_memfd_create+0xf8/0x440 [ 1626.732111] __se_sys_memfd_create+0xf8/0x440 [ 1626.736613] ? memfd_file_seals_ptr+0x150/0x150 [ 1626.741289] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1626.746660] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1626.751678] ? do_syscall_64+0x21/0x620 [ 1626.755657] do_syscall_64+0xf9/0x620 [ 1626.759464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1626.764653] RIP: 0033:0x7f247ef95279 [ 1626.768366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1626.787265] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1626.794979] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef95279 [ 1626.802249] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f247efee2c4 [ 1626.809528] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f247d90a1d0 [ 1626.816810] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 04:31:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000020000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1626.824080] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 [ 1626.846161] FAULT_INJECTION: forcing a failure. [ 1626.846161] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.884406] CPU: 0 PID: 28852 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1626.892307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1626.901658] Call Trace: [ 1626.904251] dump_stack+0x1fc/0x2ef [ 1626.907888] should_fail.cold+0xa/0xf [ 1626.911699] ? setup_fault_attr+0x200/0x200 [ 1626.916024] ? lock_acquire+0x170/0x3c0 [ 1626.920010] __should_failslab+0x115/0x180 [ 1626.924251] should_failslab+0x5/0x10 [ 1626.928054] kmem_cache_alloc+0x277/0x370 [ 1626.932219] __d_alloc+0x2b/0xa10 [ 1626.935686] d_alloc_pseudo+0x19/0x70 [ 1626.939491] alloc_file_pseudo+0xc6/0x250 [ 1626.943645] ? alloc_file+0x4d0/0x4d0 [ 1626.947449] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1626.953083] ? shmem_get_inode+0x44c/0x8d0 [ 1626.957328] __shmem_file_setup.part.0+0x102/0x2b0 [ 1626.962267] shmem_file_setup+0x61/0x90 [ 1626.966254] __se_sys_memfd_create+0x26b/0x440 [ 1626.970838] ? memfd_file_seals_ptr+0x150/0x150 [ 1626.975510] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1626.980874] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1626.985895] ? do_syscall_64+0x21/0x620 [ 1626.989871] do_syscall_64+0xf9/0x620 [ 1626.993678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1626.998867] RIP: 0033:0x7f048e04d279 [ 1627.002616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1627.021508] RSP: 002b:00007f048c9c1f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 04:31:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000003f000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1627.029223] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f048e04d279 [ 1627.036634] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f048e0a62c4 [ 1627.043891] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f048c9c21d0 [ 1627.051150] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1627.058412] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 04:31:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 2) 04:31:50 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x5a030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000003f00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000040000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:50 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) 04:31:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000020000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000004000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1627.540957] FAULT_INJECTION: forcing a failure. [ 1627.540957] name failslab, interval 1, probability 0, space 0, times 0 [ 1627.563202] FAULT_INJECTION: forcing a failure. [ 1627.563202] name failslab, interval 1, probability 0, space 0, times 0 [ 1627.596810] CPU: 1 PID: 28885 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1627.604711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1627.614066] Call Trace: [ 1627.616668] dump_stack+0x1fc/0x2ef [ 1627.620306] should_fail.cold+0xa/0xf [ 1627.624118] ? setup_fault_attr+0x200/0x200 [ 1627.628450] ? lock_acquire+0x170/0x3c0 [ 1627.632442] __should_failslab+0x115/0x180 [ 1627.636681] should_failslab+0x5/0x10 [ 1627.640486] kmem_cache_alloc+0x277/0x370 [ 1627.644646] ? shmem_destroy_callback+0xb0/0xb0 [ 1627.649324] shmem_alloc_inode+0x18/0x40 [ 1627.653390] ? shmem_destroy_callback+0xb0/0xb0 [ 1627.658063] alloc_inode+0x5d/0x180 [ 1627.661688] new_inode+0x1d/0xf0 [ 1627.665070] shmem_get_inode+0x96/0x8d0 [ 1627.669055] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1627.673904] shmem_file_setup+0x61/0x90 [ 1627.677880] __se_sys_memfd_create+0x26b/0x440 [ 1627.682464] ? memfd_file_seals_ptr+0x150/0x150 [ 1627.687140] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1627.692500] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1627.697516] ? do_syscall_64+0x21/0x620 [ 1627.701489] do_syscall_64+0xf9/0x620 [ 1627.705293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.710483] RIP: 0033:0x7f247ef95279 [ 1627.714196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1627.733182] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1627.740889] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef95279 [ 1627.748161] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f247efee2c4 [ 1627.755429] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f247d90a1d0 [ 1627.762690] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1627.769955] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 [ 1627.777240] CPU: 0 PID: 28880 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1627.785130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1627.794487] Call Trace: 04:31:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000200000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000100000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1627.797085] dump_stack+0x1fc/0x2ef [ 1627.800727] should_fail.cold+0xa/0xf [ 1627.804539] ? setup_fault_attr+0x200/0x200 [ 1627.808868] ? lock_acquire+0x170/0x3c0 [ 1627.812866] __should_failslab+0x115/0x180 [ 1627.817112] should_failslab+0x5/0x10 [ 1627.820926] kmem_cache_alloc+0x277/0x370 [ 1627.825094] __alloc_file+0x21/0x340 [ 1627.828819] alloc_empty_file+0x6d/0x170 [ 1627.832892] alloc_file+0x5e/0x4d0 [ 1627.836447] alloc_file_pseudo+0x165/0x250 [ 1627.840693] ? alloc_file+0x4d0/0x4d0 04:31:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000200000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1627.844497] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1627.850126] ? shmem_get_inode+0x44c/0x8d0 [ 1627.854375] __shmem_file_setup.part.0+0x102/0x2b0 [ 1627.859315] shmem_file_setup+0x61/0x90 [ 1627.863298] __se_sys_memfd_create+0x26b/0x440 [ 1627.867890] ? memfd_file_seals_ptr+0x150/0x150 [ 1627.872572] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1627.877947] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1627.882975] ? do_syscall_64+0x21/0x620 [ 1627.886963] do_syscall_64+0xf9/0x620 [ 1627.890774] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:31:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000300000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1627.895971] RIP: 0033:0x7f048e04d279 [ 1627.899689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1627.918592] RSP: 002b:00007f048c9c1f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1627.926318] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f048e04d279 [ 1627.933588] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f048e0a62c4 [ 1627.940861] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f048c9c21d0 [ 1627.948138] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1627.955432] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 04:31:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) [ 1628.081339] FAULT_INJECTION: forcing a failure. [ 1628.081339] name failslab, interval 1, probability 0, space 0, times 0 [ 1628.093306] CPU: 0 PID: 28906 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1628.101201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1628.110560] Call Trace: [ 1628.113157] dump_stack+0x1fc/0x2ef [ 1628.116797] should_fail.cold+0xa/0xf [ 1628.120605] ? setup_fault_attr+0x200/0x200 [ 1628.124935] ? lock_acquire+0x170/0x3c0 [ 1628.128953] __should_failslab+0x115/0x180 [ 1628.133196] should_failslab+0x5/0x10 [ 1628.137003] kmem_cache_alloc+0x277/0x370 [ 1628.141169] __d_alloc+0x2b/0xa10 [ 1628.144629] d_alloc_pseudo+0x19/0x70 [ 1628.148437] alloc_file_pseudo+0xc6/0x250 [ 1628.152592] ? alloc_file+0x4d0/0x4d0 [ 1628.156396] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1628.162024] ? shmem_get_inode+0x44c/0x8d0 [ 1628.166265] __shmem_file_setup.part.0+0x102/0x2b0 [ 1628.171201] shmem_file_setup+0x61/0x90 [ 1628.175180] __se_sys_memfd_create+0x26b/0x440 [ 1628.179762] ? memfd_file_seals_ptr+0x150/0x150 [ 1628.184486] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1628.189853] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1628.194875] ? do_syscall_64+0x21/0x620 [ 1628.198859] do_syscall_64+0xf9/0x620 [ 1628.202682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1628.207869] RIP: 0033:0x7f247ef95279 [ 1628.211587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1628.230493] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1628.238202] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef95279 [ 1628.245592] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f247efee2c4 [ 1628.252863] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f247d90a1d0 [ 1628.260134] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1628.267402] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 04:31:51 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x5b010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000400000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000fffffdef00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:51 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) 04:31:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) 04:31:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000600000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1628.462946] FAULT_INJECTION: forcing a failure. [ 1628.462946] name failslab, interval 1, probability 0, space 0, times 0 [ 1628.505905] CPU: 0 PID: 28919 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1628.513813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1628.517967] FAULT_INJECTION: forcing a failure. [ 1628.517967] name failslab, interval 1, probability 0, space 0, times 0 [ 1628.523161] Call Trace: [ 1628.523183] dump_stack+0x1fc/0x2ef [ 1628.523203] should_fail.cold+0xa/0xf [ 1628.523220] ? setup_fault_attr+0x200/0x200 [ 1628.523235] ? lock_acquire+0x170/0x3c0 [ 1628.523257] __should_failslab+0x115/0x180 [ 1628.523273] should_failslab+0x5/0x10 [ 1628.523287] kmem_cache_alloc+0x277/0x370 [ 1628.523305] __alloc_file+0x21/0x340 [ 1628.523321] alloc_empty_file+0x6d/0x170 [ 1628.523335] alloc_file+0x5e/0x4d0 [ 1628.523354] alloc_file_pseudo+0x165/0x250 [ 1628.523369] ? alloc_file+0x4d0/0x4d0 [ 1628.523390] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1628.589749] ? shmem_get_inode+0x44c/0x8d0 [ 1628.593981] __shmem_file_setup.part.0+0x102/0x2b0 [ 1628.598905] shmem_file_setup+0x61/0x90 [ 1628.602870] __se_sys_memfd_create+0x26b/0x440 [ 1628.607439] ? memfd_file_seals_ptr+0x150/0x150 [ 1628.612096] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1628.617451] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1628.622457] ? do_syscall_64+0x21/0x620 [ 1628.626423] do_syscall_64+0xf9/0x620 [ 1628.630216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1628.635390] RIP: 0033:0x7f247ef95279 04:31:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000fffffff600000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1628.639092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1628.657976] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1628.665684] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef95279 [ 1628.672940] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f247efee2c4 [ 1628.680194] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f247d90a1d0 [ 1628.687470] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1628.694727] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 04:31:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000001000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1628.744161] CPU: 0 PID: 28923 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1628.752070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1628.761425] Call Trace: [ 1628.764020] dump_stack+0x1fc/0x2ef [ 1628.767662] should_fail.cold+0xa/0xf [ 1628.771477] ? setup_fault_attr+0x200/0x200 [ 1628.775822] ? lock_acquire+0x170/0x3c0 [ 1628.779822] __should_failslab+0x115/0x180 [ 1628.784073] should_failslab+0x5/0x10 [ 1628.787880] kmem_cache_alloc_trace+0x284/0x380 04:31:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000fffffdfc00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000003f00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1628.792561] apparmor_file_alloc_security+0x394/0xad0 [ 1628.797764] ? apparmor_file_receive+0x160/0x160 [ 1628.802529] ? __alloc_file+0x21/0x340 [ 1628.806437] security_file_alloc+0x40/0x90 [ 1628.810682] __alloc_file+0xd8/0x340 [ 1628.814405] alloc_empty_file+0x6d/0x170 [ 1628.818486] alloc_file+0x5e/0x4d0 [ 1628.822042] alloc_file_pseudo+0x165/0x250 [ 1628.826284] ? alloc_file+0x4d0/0x4d0 [ 1628.830090] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1628.835723] ? shmem_get_inode+0x44c/0x8d0 04:31:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000004000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1628.839975] __shmem_file_setup.part.0+0x102/0x2b0 [ 1628.844919] shmem_file_setup+0x61/0x90 [ 1628.849011] __se_sys_memfd_create+0x26b/0x440 [ 1628.853599] ? memfd_file_seals_ptr+0x150/0x150 [ 1628.858275] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1628.863660] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1628.868682] ? do_syscall_64+0x21/0x620 [ 1628.872664] do_syscall_64+0xf9/0x620 [ 1628.876473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1628.881663] RIP: 0033:0x7f048e04d279 [ 1628.885382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1628.904282] RSP: 002b:00007f048c9c1f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1628.912013] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f048e04d279 [ 1628.919282] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f048e0a62c4 [ 1628.926565] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f048c9c21d0 [ 1628.933868] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1628.941161] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 04:31:52 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x5c020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fffffff600000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000fffffffe00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) 04:31:52 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) 04:31:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fffffdfc00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1629.428493] FAULT_INJECTION: forcing a failure. [ 1629.428493] name failslab, interval 1, probability 0, space 0, times 0 [ 1629.440388] CPU: 0 PID: 28955 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1629.448324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1629.457680] Call Trace: [ 1629.460292] dump_stack+0x1fc/0x2ef [ 1629.463935] should_fail.cold+0xa/0xf [ 1629.467744] ? setup_fault_attr+0x200/0x200 [ 1629.472070] ? lock_acquire+0x170/0x3c0 [ 1629.476055] __should_failslab+0x115/0x180 [ 1629.480302] should_failslab+0x5/0x10 [ 1629.484104] kmem_cache_alloc_trace+0x284/0x380 [ 1629.488782] apparmor_file_alloc_security+0x394/0xad0 [ 1629.493982] ? apparmor_file_receive+0x160/0x160 [ 1629.498746] ? __alloc_file+0x21/0x340 [ 1629.499439] FAULT_INJECTION: forcing a failure. [ 1629.499439] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1629.502644] security_file_alloc+0x40/0x90 [ 1629.502665] __alloc_file+0xd8/0x340 [ 1629.502682] alloc_empty_file+0x6d/0x170 [ 1629.502698] alloc_file+0x5e/0x4d0 [ 1629.502714] alloc_file_pseudo+0x165/0x250 [ 1629.502741] ? alloc_file+0x4d0/0x4d0 [ 1629.538333] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1629.543964] ? shmem_get_inode+0x44c/0x8d0 [ 1629.548211] __shmem_file_setup.part.0+0x102/0x2b0 [ 1629.553150] shmem_file_setup+0x61/0x90 [ 1629.557130] __se_sys_memfd_create+0x26b/0x440 [ 1629.561718] ? memfd_file_seals_ptr+0x150/0x150 [ 1629.566394] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1629.571766] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1629.576789] ? do_syscall_64+0x21/0x620 [ 1629.580773] do_syscall_64+0xf9/0x620 [ 1629.584587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1629.589788] RIP: 0033:0x7f247ef95279 [ 1629.593503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1629.612493] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1629.620206] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef95279 04:31:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000effdffff00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1629.627477] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f247efee2c4 [ 1629.634742] RBP: 0000000000000001 R08: 0000000000010000 R09: 00007f247d90a1d0 [ 1629.642007] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1629.649281] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200000c0 [ 1629.676461] CPU: 1 PID: 28961 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1629.684363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1629.693713] Call Trace: [ 1629.696331] dump_stack+0x1fc/0x2ef [ 1629.699969] should_fail.cold+0xa/0xf [ 1629.703778] ? lock_acquire+0x170/0x3c0 [ 1629.707759] ? setup_fault_attr+0x200/0x200 [ 1629.712099] __alloc_pages_nodemask+0x239/0x2890 [ 1629.716861] ? __lock_acquire+0x6de/0x3ff0 [ 1629.721102] ? static_obj+0x50/0x50 [ 1629.724756] ? __lock_acquire+0x6de/0x3ff0 [ 1629.728997] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1629.733846] ? __lock_acquire+0x6de/0x3ff0 [ 1629.738090] ? mark_held_locks+0xf0/0xf0 [ 1629.742154] ? unwind_next_frame+0xeee/0x1400 [ 1629.746654] ? mark_held_locks+0xf0/0xf0 [ 1629.750713] ? deref_stack_reg+0x134/0x1d0 [ 1629.754947] ? get_reg+0x176/0x1f0 [ 1629.758491] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1629.764382] alloc_pages_vma+0xf2/0x780 [ 1629.768375] shmem_alloc_page+0x11c/0x1f0 [ 1629.772525] ? shmem_swapin+0x220/0x220 [ 1629.776524] ? percpu_counter_add_batch+0x126/0x180 [ 1629.781561] ? __vm_enough_memory+0x316/0x650 [ 1629.786064] shmem_alloc_and_acct_page+0x15a/0x850 [ 1629.791001] shmem_getpage_gfp+0x4e9/0x37f0 [ 1629.795341] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1629.800449] ? mark_held_locks+0xa6/0xf0 [ 1629.804512] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1629.809700] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1629.814899] shmem_write_begin+0xff/0x1e0 [ 1629.819058] generic_perform_write+0x1f8/0x4d0 [ 1629.823653] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1629.828324] ? current_time+0x1c0/0x1c0 [ 1629.832308] ? lock_acquire+0x170/0x3c0 [ 1629.836286] __generic_file_write_iter+0x24b/0x610 [ 1629.841219] generic_file_write_iter+0x3f8/0x730 [ 1629.845987] __vfs_write+0x51b/0x770 [ 1629.849724] ? kernel_read+0x110/0x110 [ 1629.853629] ? check_preemption_disabled+0x41/0x280 [ 1629.858655] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1629.863681] vfs_write+0x1f3/0x540 [ 1629.867264] __x64_sys_pwrite64+0x1f7/0x250 [ 1629.871603] ? ksys_pwrite64+0x1a0/0x1a0 [ 1629.875677] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1629.880698] ? do_syscall_64+0x21/0x620 [ 1629.884683] do_syscall_64+0xf9/0x620 [ 1629.888498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1629.893690] RIP: 0033:0x7f048e000247 [ 1629.897405] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1629.916308] RSP: 002b:00007f048c9a0f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 04:31:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) 04:31:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1629.924039] RAX: ffffffffffffffda RBX: 00007f048e096a20 RCX: 00007f048e000247 [ 1629.931308] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 1629.938578] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f048c9a11d0 [ 1629.945844] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1629.953113] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 04:31:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fffffffe00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1630.031241] FAULT_INJECTION: forcing a failure. [ 1630.031241] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1630.077202] CPU: 1 PID: 28969 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1630.085108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1630.094576] Call Trace: [ 1630.097171] dump_stack+0x1fc/0x2ef [ 1630.100817] should_fail.cold+0xa/0xf [ 1630.104627] ? lock_acquire+0x170/0x3c0 [ 1630.108610] ? setup_fault_attr+0x200/0x200 [ 1630.112950] __alloc_pages_nodemask+0x239/0x2890 [ 1630.117717] ? __lock_acquire+0x6de/0x3ff0 [ 1630.121962] ? static_obj+0x50/0x50 [ 1630.125608] ? __lock_acquire+0x6de/0x3ff0 [ 1630.129851] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1630.134702] ? __lock_acquire+0x6de/0x3ff0 [ 1630.138952] ? mark_held_locks+0xf0/0xf0 [ 1630.143016] ? unwind_next_frame+0xeee/0x1400 [ 1630.147520] ? mark_held_locks+0xf0/0xf0 [ 1630.151583] ? deref_stack_reg+0x134/0x1d0 [ 1630.155819] ? get_reg+0x176/0x1f0 [ 1630.159371] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1630.165258] alloc_pages_vma+0xf2/0x780 [ 1630.169242] shmem_alloc_page+0x11c/0x1f0 [ 1630.173395] ? shmem_swapin+0x220/0x220 [ 1630.177394] ? percpu_counter_add_batch+0x126/0x180 [ 1630.182421] ? __vm_enough_memory+0x316/0x650 [ 1630.186924] shmem_alloc_and_acct_page+0x15a/0x850 [ 1630.191861] shmem_getpage_gfp+0x4e9/0x37f0 [ 1630.196201] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1630.201312] ? mark_held_locks+0xa6/0xf0 [ 1630.205375] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1630.210568] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1630.215769] shmem_write_begin+0xff/0x1e0 [ 1630.219925] generic_perform_write+0x1f8/0x4d0 [ 1630.224518] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1630.229191] ? current_time+0x1c0/0x1c0 [ 1630.233171] ? lock_acquire+0x170/0x3c0 [ 1630.237151] __generic_file_write_iter+0x24b/0x610 [ 1630.242107] generic_file_write_iter+0x3f8/0x730 [ 1630.246897] __vfs_write+0x51b/0x770 [ 1630.250617] ? kernel_read+0x110/0x110 [ 1630.254516] ? check_preemption_disabled+0x41/0x280 [ 1630.259573] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1630.264593] vfs_write+0x1f3/0x540 [ 1630.268160] __x64_sys_pwrite64+0x1f7/0x250 [ 1630.272485] ? ksys_pwrite64+0x1a0/0x1a0 [ 1630.276552] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1630.281571] ? do_syscall_64+0x21/0x620 [ 1630.285555] do_syscall_64+0xf9/0x620 [ 1630.289365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1630.294557] RIP: 0033:0x7f247ef48247 [ 1630.298271] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1630.317173] RSP: 002b:00007f247d909f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 04:31:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:53 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x5d020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000fcfdffff00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:53 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fcfdffff00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000f6ffffff00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000f6ffffff00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1630.324889] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef48247 [ 1630.332166] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 1630.339440] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1630.346713] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1630.353984] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 04:31:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 7) 04:31:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000feffffff00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000feffffff00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1630.542982] FAULT_INJECTION: forcing a failure. [ 1630.542982] name failslab, interval 1, probability 0, space 0, times 0 [ 1630.554624] CPU: 0 PID: 28999 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1630.562505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1630.571859] Call Trace: [ 1630.574456] dump_stack+0x1fc/0x2ef [ 1630.578092] should_fail.cold+0xa/0xf [ 1630.581915] ? setup_fault_attr+0x200/0x200 [ 1630.586249] ? __lock_acquire+0x6de/0x3ff0 [ 1630.590493] __should_failslab+0x115/0x180 [ 1630.594732] should_failslab+0x5/0x10 [ 1630.598530] kmem_cache_alloc+0x3f/0x370 [ 1630.602596] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1630.608236] __radix_tree_create+0x314/0x540 [ 1630.612665] __radix_tree_insert+0xbb/0x5f0 [ 1630.616991] ? __radix_tree_create+0x540/0x540 [ 1630.621577] ? lock_acquire+0x170/0x3c0 [ 1630.625555] ? shmem_add_to_page_cache+0x306/0xbb0 [ 1630.630494] shmem_add_to_page_cache+0x616/0xbb0 [ 1630.635350] ? shmem_recalc_inode+0x310/0x310 [ 1630.639853] ? __radix_tree_preload+0x1fe/0x280 [ 1630.644543] shmem_getpage_gfp+0x2004/0x37f0 [ 1630.648975] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1630.654089] ? mark_held_locks+0xa6/0xf0 [ 1630.658162] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1630.663357] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1630.668561] shmem_write_begin+0xff/0x1e0 [ 1630.672724] generic_perform_write+0x1f8/0x4d0 [ 1630.677322] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1630.681999] ? current_time+0x1c0/0x1c0 [ 1630.685980] ? lock_acquire+0x170/0x3c0 04:31:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000020000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1630.689958] __generic_file_write_iter+0x24b/0x610 [ 1630.694894] generic_file_write_iter+0x3f8/0x730 [ 1630.699665] __vfs_write+0x51b/0x770 [ 1630.703385] ? kernel_read+0x110/0x110 [ 1630.707289] ? check_preemption_disabled+0x41/0x280 [ 1630.712319] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1630.717349] vfs_write+0x1f3/0x540 [ 1630.720897] __x64_sys_pwrite64+0x1f7/0x250 [ 1630.725223] ? ksys_pwrite64+0x1a0/0x1a0 [ 1630.729289] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1630.734308] ? do_syscall_64+0x21/0x620 [ 1630.738292] do_syscall_64+0xf9/0x620 [ 1630.742100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1630.747297] RIP: 0033:0x7f247ef48247 [ 1630.751009] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1630.769907] RSP: 002b:00007f247d909f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1630.777617] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef48247 [ 1630.784892] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 04:31:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000f0ffffff7f0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1630.792161] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1630.799430] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1630.806701] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 04:31:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:54 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x5f010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000020000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:54 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000100000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 8) 04:31:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000002000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1631.388551] FAULT_INJECTION: forcing a failure. [ 1631.388551] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.464590] CPU: 1 PID: 29032 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1631.472498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1631.481857] Call Trace: [ 1631.484456] dump_stack+0x1fc/0x2ef [ 1631.488100] should_fail.cold+0xa/0xf [ 1631.491913] ? setup_fault_attr+0x200/0x200 [ 1631.496242] ? lock_acquire+0x170/0x3c0 [ 1631.500231] __should_failslab+0x115/0x180 [ 1631.504476] should_failslab+0x5/0x10 [ 1631.508285] kmem_cache_alloc+0x277/0x370 [ 1631.512453] getname_flags+0xce/0x590 [ 1631.516267] do_sys_open+0x26c/0x520 [ 1631.519988] ? filp_open+0x70/0x70 [ 1631.523538] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1631.528910] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1631.533932] ? do_syscall_64+0x21/0x620 [ 1631.537916] do_syscall_64+0xf9/0x620 [ 1631.541731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1631.546921] RIP: 0033:0x7f247ef48194 04:31:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000100000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000002000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000001000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000007ffffffff000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1631.550638] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1631.569541] RSP: 002b:00007f247d909eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1631.577256] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef48194 [ 1631.584527] RDX: 0000000000000002 RSI: 00007f247d909fe0 RDI: 00000000ffffff9c [ 1631.591801] RBP: 00007f247d909fe0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1631.599071] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1631.606342] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:31:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:55 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x60000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 9) 04:31:55 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000002000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000001000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000002000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1632.369885] FAULT_INJECTION: forcing a failure. [ 1632.369885] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1632.381713] CPU: 1 PID: 29071 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1632.389597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1632.398954] Call Trace: [ 1632.401551] dump_stack+0x1fc/0x2ef [ 1632.405198] should_fail.cold+0xa/0xf [ 1632.409013] ? setup_fault_attr+0x200/0x200 [ 1632.413341] ? do_writepages+0x290/0x290 [ 1632.417410] ? unlock_page+0x13d/0x230 [ 1632.421317] __alloc_pages_nodemask+0x239/0x2890 [ 1632.426091] ? generic_perform_write+0x36c/0x4d0 [ 1632.430859] ? __lock_acquire+0x6de/0x3ff0 [ 1632.435109] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1632.439983] ? lock_downgrade+0x720/0x720 [ 1632.444137] ? lock_acquire+0x170/0x3c0 [ 1632.448132] ? up_write+0x18/0x150 [ 1632.451676] ? generic_file_write_iter+0x381/0x730 [ 1632.456620] cache_grow_begin+0xa4/0x8a0 [ 1632.460688] ? setup_fault_attr+0x200/0x200 [ 1632.465010] ? lock_acquire+0x170/0x3c0 04:31:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000003000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1632.468995] cache_alloc_refill+0x273/0x340 [ 1632.473326] kmem_cache_alloc+0x346/0x370 [ 1632.477485] getname_flags+0xce/0x590 [ 1632.481296] do_sys_open+0x26c/0x520 [ 1632.485019] ? filp_open+0x70/0x70 [ 1632.488570] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1632.493941] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1632.498973] ? do_syscall_64+0x21/0x620 [ 1632.502957] do_syscall_64+0xf9/0x620 [ 1632.506769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1632.511960] RIP: 0033:0x7f247ef48194 [ 1632.515679] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1632.534580] RSP: 002b:00007f247d909eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1632.542301] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef48194 [ 1632.549573] RDX: 0000000000000002 RSI: 00007f247d909fe0 RDI: 00000000ffffff9c [ 1632.556846] RBP: 00007f247d909fe0 R08: 0000000000000000 R09: 00007f247d90a1d0 04:31:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000004000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1632.564116] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1632.571470] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:31:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000006000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000003000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:55 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:56 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x60020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4d91bffa00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000007000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 10) 04:31:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000004000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:56 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1633.341539] FAULT_INJECTION: forcing a failure. [ 1633.341539] name failslab, interval 1, probability 0, space 0, times 0 04:31:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000010000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000006000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1633.384192] CPU: 1 PID: 29118 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1633.392095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1633.401452] Call Trace: [ 1633.404048] dump_stack+0x1fc/0x2ef [ 1633.407689] should_fail.cold+0xa/0xf [ 1633.411500] ? setup_fault_attr+0x200/0x200 [ 1633.415827] ? lock_acquire+0x170/0x3c0 [ 1633.419821] __should_failslab+0x115/0x180 [ 1633.424072] should_failslab+0x5/0x10 [ 1633.427882] kmem_cache_alloc+0x277/0x370 [ 1633.432045] __alloc_file+0x21/0x340 [ 1633.435766] alloc_empty_file+0x6d/0x170 [ 1633.439838] path_openat+0xe9/0x2df0 [ 1633.443560] ? __lock_acquire+0x6de/0x3ff0 [ 1633.447815] ? path_lookupat+0x8d0/0x8d0 [ 1633.451885] ? mark_held_locks+0xf0/0xf0 [ 1633.455959] do_filp_open+0x18c/0x3f0 [ 1633.459761] ? may_open_dev+0xf0/0xf0 [ 1633.463565] ? __alloc_fd+0x28d/0x570 [ 1633.467378] ? lock_downgrade+0x720/0x720 [ 1633.471527] ? lock_acquire+0x170/0x3c0 [ 1633.475499] ? __alloc_fd+0x34/0x570 [ 1633.479253] ? do_raw_spin_unlock+0x171/0x230 [ 1633.483749] ? _raw_spin_unlock+0x29/0x40 [ 1633.487901] ? __alloc_fd+0x28d/0x570 [ 1633.491709] do_sys_open+0x3b3/0x520 [ 1633.495422] ? filp_open+0x70/0x70 [ 1633.498972] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1633.504330] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1633.509333] ? do_syscall_64+0x21/0x620 [ 1633.513297] do_syscall_64+0xf9/0x620 [ 1633.517091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1633.522267] RIP: 0033:0x7f247ef48194 [ 1633.525971] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1633.544865] RSP: 002b:00007f247d909eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1633.552559] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef48194 [ 1633.559988] RDX: 0000000000000002 RSI: 00007f247d909fe0 RDI: 00000000ffffff9c [ 1633.567240] RBP: 00007f247d909fe0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1633.574495] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 04:31:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 11) [ 1633.581758] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1633.604213] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (29122) 04:31:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000003f000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:56 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1633.782618] FAULT_INJECTION: forcing a failure. [ 1633.782618] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.818127] CPU: 0 PID: 29140 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1633.826031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1633.835389] Call Trace: [ 1633.837985] dump_stack+0x1fc/0x2ef [ 1633.841620] should_fail.cold+0xa/0xf [ 1633.845425] ? setup_fault_attr+0x200/0x200 [ 1633.849753] ? lock_acquire+0x170/0x3c0 [ 1633.853739] __should_failslab+0x115/0x180 [ 1633.857979] should_failslab+0x5/0x10 [ 1633.861782] kmem_cache_alloc_trace+0x284/0x380 [ 1633.866457] apparmor_file_alloc_security+0x394/0xad0 [ 1633.871650] ? apparmor_file_receive+0x160/0x160 [ 1633.876409] ? __alloc_file+0x21/0x340 [ 1633.880426] security_file_alloc+0x40/0x90 [ 1633.884669] __alloc_file+0xd8/0x340 [ 1633.888388] alloc_empty_file+0x6d/0x170 [ 1633.892461] path_openat+0xe9/0x2df0 [ 1633.896183] ? __lock_acquire+0x6de/0x3ff0 [ 1633.900433] ? path_lookupat+0x8d0/0x8d0 [ 1633.904506] ? mark_held_locks+0xf0/0xf0 [ 1633.908577] do_filp_open+0x18c/0x3f0 [ 1633.912379] ? may_open_dev+0xf0/0xf0 [ 1633.916184] ? __alloc_fd+0x28d/0x570 [ 1633.919994] ? lock_downgrade+0x720/0x720 [ 1633.924143] ? lock_acquire+0x170/0x3c0 [ 1633.928116] ? __alloc_fd+0x34/0x570 [ 1633.931842] ? do_raw_spin_unlock+0x171/0x230 [ 1633.936337] ? _raw_spin_unlock+0x29/0x40 [ 1633.940484] ? __alloc_fd+0x28d/0x570 [ 1633.944294] do_sys_open+0x3b3/0x520 [ 1633.948014] ? filp_open+0x70/0x70 [ 1633.951568] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1633.956931] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1633.961952] ? do_syscall_64+0x21/0x620 [ 1633.965936] do_syscall_64+0xf9/0x620 [ 1633.969745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1633.974936] RIP: 0033:0x7f247ef48194 [ 1633.978651] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1633.997556] RSP: 002b:00007f247d909eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1634.005275] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef48194 [ 1634.012552] RDX: 0000000000000002 RSI: 00007f247d909fe0 RDI: 00000000ffffff9c [ 1634.019819] RBP: 00007f247d909fe0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1634.027087] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1634.034359] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:31:57 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x61010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000010000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 12) 04:31:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000040000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:57 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1634.352340] FAULT_INJECTION: forcing a failure. [ 1634.352340] name failslab, interval 1, probability 0, space 0, times 0 [ 1634.375258] CPU: 0 PID: 29161 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1634.383162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1634.392512] Call Trace: [ 1634.395105] dump_stack+0x1fc/0x2ef [ 1634.398740] should_fail.cold+0xa/0xf [ 1634.402546] ? setup_fault_attr+0x200/0x200 [ 1634.406872] ? lock_acquire+0x170/0x3c0 [ 1634.410853] __should_failslab+0x115/0x180 [ 1634.415091] should_failslab+0x5/0x10 [ 1634.418901] kmem_cache_alloc_trace+0x284/0x380 [ 1634.423574] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1634.428329] __kthread_create_on_node+0xd2/0x410 [ 1634.433088] ? kthread_parkme+0xa0/0xa0 [ 1634.437062] ? lock_acquire+0x170/0x3c0 [ 1634.441048] ? lo_ioctl+0x1bb/0x20e0 [ 1634.444772] ? __mutex_lock+0x368/0x1190 [ 1634.448834] ? lock_downgrade+0x720/0x720 [ 1634.452985] ? check_preemption_disabled+0x41/0x280 [ 1634.458009] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1634.462772] kthread_create_on_node+0xbb/0xf0 [ 1634.467282] ? __kthread_create_on_node+0x410/0x410 [ 1634.472303] ? __fget+0x356/0x510 [ 1634.475762] ? do_dup2+0x450/0x450 [ 1634.479315] ? __lockdep_init_map+0x100/0x5a0 [ 1634.483814] ? __lockdep_init_map+0x100/0x5a0 [ 1634.488323] lo_ioctl+0xae5/0x20e0 [ 1634.491873] ? loop_set_status64+0x110/0x110 [ 1634.496290] blkdev_ioctl+0x5cb/0x1a80 [ 1634.500186] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1634.505549] ? blkpg_ioctl+0x9d0/0x9d0 [ 1634.509441] ? mark_held_locks+0xf0/0xf0 [ 1634.513506] ? mark_held_locks+0xf0/0xf0 [ 1634.517575] ? debug_check_no_obj_freed+0x201/0x490 [ 1634.522596] ? lock_downgrade+0x720/0x720 [ 1634.526748] block_ioctl+0xe9/0x130 [ 1634.530380] ? blkdev_fallocate+0x3f0/0x3f0 [ 1634.534706] do_vfs_ioctl+0xcdb/0x12e0 [ 1634.538596] ? lock_downgrade+0x720/0x720 [ 1634.542747] ? check_preemption_disabled+0x41/0x280 [ 1634.547768] ? ioctl_preallocate+0x200/0x200 [ 1634.552185] ? __fget+0x356/0x510 [ 1634.555640] ? do_dup2+0x450/0x450 [ 1634.559185] ? do_sys_open+0x2bf/0x520 [ 1634.563084] ksys_ioctl+0x9b/0xc0 [ 1634.566541] __x64_sys_ioctl+0x6f/0xb0 [ 1634.570432] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1634.575022] do_syscall_64+0xf9/0x620 [ 1634.578835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1634.584026] RIP: 0033:0x7f247ef95037 04:31:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000000000003f000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000fffffffffffffdef000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000040000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1634.587742] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1634.606642] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1634.614349] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1634.621615] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1634.628881] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1634.636152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1634.643415] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:31:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000fffffff6000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fffffff6000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 13) [ 1634.958104] FAULT_INJECTION: forcing a failure. [ 1634.958104] name failslab, interval 1, probability 0, space 0, times 0 [ 1634.969584] CPU: 0 PID: 29189 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1634.977471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1634.986826] Call Trace: [ 1634.989425] dump_stack+0x1fc/0x2ef [ 1634.993059] should_fail.cold+0xa/0xf [ 1634.996867] ? setup_fault_attr+0x200/0x200 [ 1635.001189] ? lock_acquire+0x170/0x3c0 [ 1635.005173] __should_failslab+0x115/0x180 [ 1635.009412] should_failslab+0x5/0x10 [ 1635.013305] kmem_cache_alloc+0x277/0x370 [ 1635.017456] __kernfs_new_node+0xd2/0x680 [ 1635.021607] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1635.026364] ? __cpu_to_node+0x7b/0xa0 [ 1635.030260] ? account_entity_enqueue+0x2e5/0x440 [ 1635.035108] ? mark_held_locks+0xf0/0xf0 [ 1635.039172] ? enqueue_entity+0xf86/0x3850 [ 1635.043458] ? set_user_nice.part.0+0x3b9/0xab0 [ 1635.048132] kernfs_create_dir_ns+0x9e/0x230 [ 1635.052544] internal_create_group+0x1c1/0xb20 [ 1635.057135] ? sysfs_remove_link_from_group+0x70/0x70 [ 1635.062325] ? lock_downgrade+0x720/0x720 [ 1635.066497] lo_ioctl+0xf7c/0x20e0 [ 1635.070045] ? loop_set_status64+0x110/0x110 [ 1635.074545] blkdev_ioctl+0x5cb/0x1a80 [ 1635.078440] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1635.083805] ? blkpg_ioctl+0x9d0/0x9d0 [ 1635.087692] ? mark_held_locks+0xf0/0xf0 [ 1635.091762] ? mark_held_locks+0xf0/0xf0 [ 1635.095830] ? debug_check_no_obj_freed+0x201/0x490 [ 1635.100856] ? lock_downgrade+0x720/0x720 [ 1635.105010] block_ioctl+0xe9/0x130 [ 1635.108637] ? blkdev_fallocate+0x3f0/0x3f0 [ 1635.112961] do_vfs_ioctl+0xcdb/0x12e0 [ 1635.116851] ? lock_downgrade+0x720/0x720 [ 1635.121273] ? check_preemption_disabled+0x41/0x280 [ 1635.126287] ? ioctl_preallocate+0x200/0x200 [ 1635.130705] ? __fget+0x356/0x510 [ 1635.134164] ? do_dup2+0x450/0x450 [ 1635.137724] ? do_sys_open+0x2bf/0x520 [ 1635.141622] ksys_ioctl+0x9b/0xc0 [ 1635.145078] __x64_sys_ioctl+0x6f/0xb0 [ 1635.148969] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1635.153549] do_syscall_64+0xf9/0x620 [ 1635.157355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1635.162544] RIP: 0033:0x7f247ef95037 [ 1635.166289] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1635.185190] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1635.192900] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1635.200166] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 04:31:58 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:58 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x67030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000fffffdfc000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fffffdfc000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1635.207436] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1635.214836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1635.222276] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:31:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 14) 04:31:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000fffffffe000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000fffffffe000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000ffffffff000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1635.465626] FAULT_INJECTION: forcing a failure. [ 1635.465626] name failslab, interval 1, probability 0, space 0, times 0 [ 1635.491536] CPU: 1 PID: 29215 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1635.499441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1635.508797] Call Trace: [ 1635.511393] dump_stack+0x1fc/0x2ef [ 1635.515027] should_fail.cold+0xa/0xf [ 1635.518835] ? setup_fault_attr+0x200/0x200 [ 1635.523165] ? lock_acquire+0x170/0x3c0 [ 1635.527159] __should_failslab+0x115/0x180 [ 1635.531400] should_failslab+0x5/0x10 [ 1635.535204] kmem_cache_alloc+0x277/0x370 [ 1635.539357] __kernfs_new_node+0xd2/0x680 [ 1635.543506] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1635.548261] ? kernfs_activate+0x2c/0x1d0 [ 1635.552414] ? lock_downgrade+0x720/0x720 [ 1635.556561] ? kernfs_add_one+0x51/0x4c0 [ 1635.560622] ? mutex_trylock+0x1a0/0x1a0 04:31:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000effdffffffffffff000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1635.564688] ? __mutex_unlock_slowpath+0xea/0x610 [ 1635.569549] kernfs_new_node+0x92/0x120 [ 1635.573543] __kernfs_create_file+0x51/0x340 [ 1635.577961] sysfs_add_file_mode_ns+0x226/0x540 [ 1635.582643] internal_create_group+0x355/0xb20 [ 1635.587233] ? sysfs_remove_link_from_group+0x70/0x70 [ 1635.592425] ? lock_downgrade+0x720/0x720 [ 1635.596597] lo_ioctl+0xf7c/0x20e0 [ 1635.600162] ? loop_set_status64+0x110/0x110 [ 1635.604573] blkdev_ioctl+0x5cb/0x1a80 [ 1635.608467] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1635.613834] ? blkpg_ioctl+0x9d0/0x9d0 [ 1635.617723] ? mark_held_locks+0xf0/0xf0 [ 1635.621787] ? mark_held_locks+0xf0/0xf0 [ 1635.625856] ? debug_check_no_obj_freed+0x201/0x490 [ 1635.630877] ? lock_downgrade+0x720/0x720 [ 1635.635028] block_ioctl+0xe9/0x130 [ 1635.638652] ? blkdev_fallocate+0x3f0/0x3f0 [ 1635.642978] do_vfs_ioctl+0xcdb/0x12e0 [ 1635.646867] ? lock_downgrade+0x720/0x720 [ 1635.651015] ? check_preemption_disabled+0x41/0x280 [ 1635.656035] ? ioctl_preallocate+0x200/0x200 [ 1635.660450] ? __fget+0x356/0x510 [ 1635.663908] ? do_dup2+0x450/0x450 [ 1635.667448] ? do_sys_open+0x2bf/0x520 [ 1635.671343] ksys_ioctl+0x9b/0xc0 [ 1635.674798] __x64_sys_ioctl+0x6f/0xb0 [ 1635.678691] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1635.683361] do_syscall_64+0xf9/0x620 [ 1635.687165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1635.692350] RIP: 0033:0x7f247ef95037 [ 1635.696064] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:31:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000ffffffff000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1635.714959] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1635.722680] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1635.729946] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1635.737210] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1635.744474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1635.751742] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:31:58 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000002000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:59 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x68000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:31:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000002000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 15) 04:31:59 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000003000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000003000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1636.373916] FAULT_INJECTION: forcing a failure. [ 1636.373916] name failslab, interval 1, probability 0, space 0, times 0 [ 1636.404791] CPU: 1 PID: 29256 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1636.412775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1636.422481] Call Trace: [ 1636.425163] dump_stack+0x1fc/0x2ef [ 1636.428797] should_fail.cold+0xa/0xf [ 1636.432606] ? setup_fault_attr+0x200/0x200 [ 1636.436931] ? lock_acquire+0x170/0x3c0 [ 1636.440909] __should_failslab+0x115/0x180 [ 1636.445148] should_failslab+0x5/0x10 [ 1636.448945] kmem_cache_alloc+0x277/0x370 [ 1636.453098] __kernfs_new_node+0xd2/0x680 [ 1636.457257] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1636.462017] ? __mutex_unlock_slowpath+0xea/0x610 [ 1636.466865] ? wait_for_completion_io+0x10/0x10 [ 1636.471635] ? kernfs_next_descendant_post+0x19c/0x290 [ 1636.476926] kernfs_new_node+0x92/0x120 [ 1636.480906] __kernfs_create_file+0x51/0x340 [ 1636.485320] sysfs_add_file_mode_ns+0x226/0x540 [ 1636.489997] internal_create_group+0x355/0xb20 [ 1636.494591] ? sysfs_remove_link_from_group+0x70/0x70 [ 1636.499778] ? lock_downgrade+0x720/0x720 [ 1636.503949] lo_ioctl+0xf7c/0x20e0 [ 1636.507504] ? loop_set_status64+0x110/0x110 [ 1636.511922] blkdev_ioctl+0x5cb/0x1a80 [ 1636.515811] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1636.521172] ? blkpg_ioctl+0x9d0/0x9d0 [ 1636.525063] ? mark_held_locks+0xf0/0xf0 [ 1636.529131] ? mark_held_locks+0xf0/0xf0 [ 1636.533195] ? debug_check_no_obj_freed+0x201/0x490 [ 1636.538215] ? lock_downgrade+0x720/0x720 [ 1636.542367] block_ioctl+0xe9/0x130 [ 1636.545993] ? blkdev_fallocate+0x3f0/0x3f0 [ 1636.550318] do_vfs_ioctl+0xcdb/0x12e0 [ 1636.554207] ? lock_downgrade+0x720/0x720 [ 1636.558356] ? check_preemption_disabled+0x41/0x280 [ 1636.563369] ? ioctl_preallocate+0x200/0x200 [ 1636.567783] ? __fget+0x356/0x510 [ 1636.571245] ? do_dup2+0x450/0x450 [ 1636.574785] ? do_sys_open+0x2bf/0x520 [ 1636.578679] ksys_ioctl+0x9b/0xc0 [ 1636.582147] __x64_sys_ioctl+0x6f/0xb0 [ 1636.586037] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1636.590624] do_syscall_64+0xf9/0x620 [ 1636.594431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1636.599648] RIP: 0033:0x7f247ef95037 [ 1636.603373] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:31:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000004000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1636.622278] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1636.629990] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1636.637256] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1636.644525] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1636.651794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1636.659059] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:31:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000004000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000006000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:31:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:31:59 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:00 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x6c000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 16) 04:32:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000006000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000010000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:00 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000007000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:00 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000030000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000010000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1637.319505] FAULT_INJECTION: forcing a failure. [ 1637.319505] name failslab, interval 1, probability 0, space 0, times 0 [ 1637.361109] CPU: 1 PID: 29311 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1637.369022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1637.378374] Call Trace: [ 1637.380970] dump_stack+0x1fc/0x2ef [ 1637.384606] should_fail.cold+0xa/0xf [ 1637.388412] ? setup_fault_attr+0x200/0x200 [ 1637.392735] ? lock_acquire+0x170/0x3c0 [ 1637.396718] __should_failslab+0x115/0x180 [ 1637.400964] should_failslab+0x5/0x10 [ 1637.404771] kmem_cache_alloc+0x277/0x370 04:32:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000030000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1637.408923] __kernfs_new_node+0xd2/0x680 [ 1637.413086] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1637.417854] ? __mutex_unlock_slowpath+0xea/0x610 [ 1637.422701] ? wait_for_completion_io+0x10/0x10 [ 1637.427380] ? kernfs_next_descendant_post+0x19c/0x290 [ 1637.432664] kernfs_new_node+0x92/0x120 [ 1637.436654] __kernfs_create_file+0x51/0x340 [ 1637.441067] sysfs_add_file_mode_ns+0x226/0x540 [ 1637.445747] internal_create_group+0x355/0xb20 [ 1637.450339] ? sysfs_remove_link_from_group+0x70/0x70 [ 1637.455534] ? lock_downgrade+0x720/0x720 04:32:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000060000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1637.459698] lo_ioctl+0xf7c/0x20e0 [ 1637.463248] ? loop_set_status64+0x110/0x110 [ 1637.467663] blkdev_ioctl+0x5cb/0x1a80 [ 1637.471571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1637.476937] ? blkpg_ioctl+0x9d0/0x9d0 [ 1637.480827] ? mark_held_locks+0xf0/0xf0 [ 1637.484894] ? mark_held_locks+0xf0/0xf0 [ 1637.488958] ? debug_check_no_obj_freed+0x201/0x490 [ 1637.493983] ? lock_downgrade+0x720/0x720 [ 1637.498223] block_ioctl+0xe9/0x130 [ 1637.501853] ? blkdev_fallocate+0x3f0/0x3f0 [ 1637.506179] do_vfs_ioctl+0xcdb/0x12e0 [ 1637.510070] ? lock_downgrade+0x720/0x720 [ 1637.514223] ? check_preemption_disabled+0x41/0x280 [ 1637.519243] ? ioctl_preallocate+0x200/0x200 [ 1637.523659] ? __fget+0x356/0x510 [ 1637.527123] ? do_dup2+0x450/0x450 [ 1637.530668] ? do_sys_open+0x2bf/0x520 [ 1637.534566] ksys_ioctl+0x9b/0xc0 [ 1637.538024] __x64_sys_ioctl+0x6f/0xb0 [ 1637.541917] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1637.546507] do_syscall_64+0xf9/0x620 [ 1637.550316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1637.555509] RIP: 0033:0x7f247ef95037 [ 1637.559230] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1637.578126] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1637.585835] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1637.593108] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1637.600374] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1637.607638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1637.614904] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:01 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x70000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000060000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000070000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 17) 04:32:01 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000200000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000200000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1638.280053] FAULT_INJECTION: forcing a failure. [ 1638.280053] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.313847] CPU: 0 PID: 29355 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1638.321755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1638.331114] Call Trace: [ 1638.333717] dump_stack+0x1fc/0x2ef [ 1638.337356] should_fail.cold+0xa/0xf [ 1638.341187] ? setup_fault_attr+0x200/0x200 [ 1638.345520] ? lock_acquire+0x170/0x3c0 [ 1638.349512] __should_failslab+0x115/0x180 [ 1638.353756] should_failslab+0x5/0x10 [ 1638.357563] kmem_cache_alloc+0x277/0x370 [ 1638.361730] __kernfs_new_node+0xd2/0x680 [ 1638.365884] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1638.370647] ? __mutex_unlock_slowpath+0xea/0x610 [ 1638.375496] ? wait_for_completion_io+0x10/0x10 [ 1638.380169] ? kernfs_next_descendant_post+0x19c/0x290 [ 1638.385457] kernfs_new_node+0x92/0x120 [ 1638.389441] __kernfs_create_file+0x51/0x340 [ 1638.393861] sysfs_add_file_mode_ns+0x226/0x540 [ 1638.398542] internal_create_group+0x355/0xb20 [ 1638.403137] ? sysfs_remove_link_from_group+0x70/0x70 [ 1638.408330] ? lock_downgrade+0x720/0x720 [ 1638.412495] lo_ioctl+0xf7c/0x20e0 [ 1638.416047] ? loop_set_status64+0x110/0x110 [ 1638.420462] blkdev_ioctl+0x5cb/0x1a80 [ 1638.424356] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1638.429718] ? blkpg_ioctl+0x9d0/0x9d0 [ 1638.433612] ? mark_held_locks+0xf0/0xf0 [ 1638.437678] ? mark_held_locks+0xf0/0xf0 [ 1638.441745] ? debug_check_no_obj_freed+0x201/0x490 [ 1638.446767] ? lock_downgrade+0x720/0x720 [ 1638.450921] block_ioctl+0xe9/0x130 [ 1638.454546] ? blkdev_fallocate+0x3f0/0x3f0 [ 1638.458874] do_vfs_ioctl+0xcdb/0x12e0 [ 1638.462774] ? lock_downgrade+0x720/0x720 [ 1638.466926] ? check_preemption_disabled+0x41/0x280 [ 1638.471950] ? ioctl_preallocate+0x200/0x200 [ 1638.476363] ? __fget+0x356/0x510 [ 1638.479820] ? do_dup2+0x450/0x450 [ 1638.483371] ? do_sys_open+0x2bf/0x520 [ 1638.487268] ksys_ioctl+0x9b/0xc0 [ 1638.490732] __x64_sys_ioctl+0x6f/0xb0 [ 1638.494623] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1638.499210] do_syscall_64+0xf9/0x620 [ 1638.503018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1638.508207] RIP: 0033:0x7f247ef95037 [ 1638.511920] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:32:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000003f0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000400000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000200000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1638.530819] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1638.538547] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1638.545819] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1638.553091] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1638.560493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1638.567762] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:02 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x74000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000003f0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000002000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:02 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 18) 04:32:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000400000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000001000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1639.174860] FAULT_INJECTION: forcing a failure. [ 1639.174860] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.209346] CPU: 1 PID: 29390 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1639.217246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1639.226617] Call Trace: [ 1639.229212] dump_stack+0x1fc/0x2ef [ 1639.232859] should_fail.cold+0xa/0xf [ 1639.236669] ? setup_fault_attr+0x200/0x200 [ 1639.240997] ? lock_acquire+0x170/0x3c0 [ 1639.244976] __should_failslab+0x115/0x180 [ 1639.249218] should_failslab+0x5/0x10 [ 1639.253015] kmem_cache_alloc+0x277/0x370 [ 1639.257168] __kernfs_new_node+0xd2/0x680 [ 1639.261321] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1639.266083] ? __mutex_unlock_slowpath+0xea/0x610 [ 1639.270928] ? wait_for_completion_io+0x10/0x10 [ 1639.275600] ? kernfs_next_descendant_post+0x19c/0x290 [ 1639.280884] kernfs_new_node+0x92/0x120 [ 1639.284866] __kernfs_create_file+0x51/0x340 [ 1639.289282] sysfs_add_file_mode_ns+0x226/0x540 [ 1639.293958] internal_create_group+0x355/0xb20 [ 1639.298547] ? sysfs_remove_link_from_group+0x70/0x70 [ 1639.303735] ? lock_downgrade+0x720/0x720 [ 1639.307898] lo_ioctl+0xf7c/0x20e0 [ 1639.311450] ? loop_set_status64+0x110/0x110 [ 1639.315860] blkdev_ioctl+0x5cb/0x1a80 [ 1639.319749] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1639.325114] ? blkpg_ioctl+0x9d0/0x9d0 [ 1639.329009] ? mark_held_locks+0xf0/0xf0 [ 1639.333069] ? mark_held_locks+0xf0/0xf0 [ 1639.337136] ? debug_check_no_obj_freed+0x201/0x490 [ 1639.342158] ? lock_downgrade+0x720/0x720 [ 1639.346310] block_ioctl+0xe9/0x130 [ 1639.349951] ? blkdev_fallocate+0x3f0/0x3f0 [ 1639.354272] do_vfs_ioctl+0xcdb/0x12e0 [ 1639.358163] ? lock_downgrade+0x720/0x720 [ 1639.362316] ? check_preemption_disabled+0x41/0x280 [ 1639.367335] ? ioctl_preallocate+0x200/0x200 [ 1639.371744] ? __fget+0x356/0x510 [ 1639.375196] ? do_dup2+0x450/0x450 [ 1639.378739] ? do_sys_open+0x2bf/0x520 [ 1639.382639] ksys_ioctl+0x9b/0xc0 [ 1639.386096] __x64_sys_ioctl+0x6f/0xb0 [ 1639.389985] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1639.394570] do_syscall_64+0xf9/0x620 [ 1639.398377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1639.403565] RIP: 0033:0x7f247ef95037 [ 1639.407275] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:32:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fdef0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000002000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000003000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1639.426173] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1639.433884] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1639.441148] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1639.448413] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1639.455680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1639.462949] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:02 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:02 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x7a000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000effd0000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 19) 04:32:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000004000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:02 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1639.971449] FAULT_INJECTION: forcing a failure. [ 1639.971449] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.983101] CPU: 0 PID: 29425 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1639.990985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1640.000340] Call Trace: [ 1640.002940] dump_stack+0x1fc/0x2ef [ 1640.006575] should_fail.cold+0xa/0xf [ 1640.010385] ? setup_fault_attr+0x200/0x200 [ 1640.014712] ? lock_acquire+0x170/0x3c0 [ 1640.018783] __should_failslab+0x115/0x180 [ 1640.023028] should_failslab+0x5/0x10 [ 1640.026835] kmem_cache_alloc+0x277/0x370 [ 1640.030987] __kernfs_new_node+0xd2/0x680 [ 1640.035137] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1640.039897] ? __mutex_unlock_slowpath+0xea/0x610 [ 1640.044739] ? wait_for_completion_io+0x10/0x10 [ 1640.049413] ? kernfs_next_descendant_post+0x19c/0x290 [ 1640.054699] kernfs_new_node+0x92/0x120 [ 1640.058682] __kernfs_create_file+0x51/0x340 [ 1640.063100] sysfs_add_file_mode_ns+0x226/0x540 [ 1640.067773] internal_create_group+0x355/0xb20 [ 1640.072366] ? sysfs_remove_link_from_group+0x70/0x70 [ 1640.077557] ? lock_downgrade+0x720/0x720 [ 1640.081715] lo_ioctl+0xf7c/0x20e0 [ 1640.085283] ? loop_set_status64+0x110/0x110 [ 1640.089693] blkdev_ioctl+0x5cb/0x1a80 [ 1640.093583] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1640.098945] ? blkpg_ioctl+0x9d0/0x9d0 [ 1640.102839] ? mark_held_locks+0xf0/0xf0 [ 1640.106908] ? mark_held_locks+0xf0/0xf0 [ 1640.110982] ? debug_check_no_obj_freed+0x201/0x490 [ 1640.116006] ? lock_downgrade+0x720/0x720 [ 1640.120156] block_ioctl+0xe9/0x130 [ 1640.123781] ? blkdev_fallocate+0x3f0/0x3f0 [ 1640.128100] do_vfs_ioctl+0xcdb/0x12e0 [ 1640.131995] ? lock_downgrade+0x720/0x720 [ 1640.136145] ? check_preemption_disabled+0x41/0x280 [ 1640.141162] ? ioctl_preallocate+0x200/0x200 [ 1640.145574] ? __fget+0x356/0x510 [ 1640.149032] ? do_dup2+0x450/0x450 [ 1640.152571] ? do_sys_open+0x2bf/0x520 [ 1640.156466] ksys_ioctl+0x9b/0xc0 [ 1640.159922] __x64_sys_ioctl+0x6f/0xb0 [ 1640.163810] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1640.168396] do_syscall_64+0xf9/0x620 [ 1640.172202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1640.177392] RIP: 0033:0x7f247ef95037 [ 1640.181104] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1640.200000] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1640.207705] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1640.214972] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1640.222242] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1640.229505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1640.236770] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000006000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000200000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000010000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000002000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 20) 04:32:03 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1640.439711] FAULT_INJECTION: forcing a failure. [ 1640.439711] name failslab, interval 1, probability 0, space 0, times 0 [ 1640.471274] CPU: 0 PID: 29453 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1640.479179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1640.488535] Call Trace: [ 1640.491131] dump_stack+0x1fc/0x2ef [ 1640.494765] should_fail.cold+0xa/0xf [ 1640.498579] ? setup_fault_attr+0x200/0x200 [ 1640.502902] ? lock_acquire+0x170/0x3c0 [ 1640.506883] ? dev_uevent_filter+0xd0/0xd0 [ 1640.511111] __should_failslab+0x115/0x180 [ 1640.515348] should_failslab+0x5/0x10 [ 1640.519149] kmem_cache_alloc_trace+0x284/0x380 [ 1640.523825] ? dev_uevent_filter+0xd0/0xd0 [ 1640.528096] kobject_uevent_env+0x236/0x1480 [ 1640.532516] lo_ioctl+0xff9/0x20e0 [ 1640.536063] ? loop_set_status64+0x110/0x110 [ 1640.540474] blkdev_ioctl+0x5cb/0x1a80 [ 1640.544360] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1640.549720] ? blkpg_ioctl+0x9d0/0x9d0 [ 1640.553607] ? mark_held_locks+0xf0/0xf0 [ 1640.557764] ? mark_held_locks+0xf0/0xf0 [ 1640.561836] ? debug_check_no_obj_freed+0x201/0x490 [ 1640.566870] ? lock_downgrade+0x720/0x720 [ 1640.571016] block_ioctl+0xe9/0x130 [ 1640.574639] ? blkdev_fallocate+0x3f0/0x3f0 [ 1640.578961] do_vfs_ioctl+0xcdb/0x12e0 [ 1640.582848] ? lock_downgrade+0x720/0x720 [ 1640.587001] ? check_preemption_disabled+0x41/0x280 [ 1640.592019] ? ioctl_preallocate+0x200/0x200 [ 1640.596432] ? __fget+0x356/0x510 [ 1640.599890] ? do_dup2+0x450/0x450 [ 1640.603440] ? do_sys_open+0x2bf/0x520 [ 1640.607337] ksys_ioctl+0x9b/0xc0 [ 1640.610797] __x64_sys_ioctl+0x6f/0xb0 [ 1640.614683] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1640.619269] do_syscall_64+0xf9/0x620 [ 1640.623082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1640.628270] RIP: 0033:0x7f247ef95037 [ 1640.631984] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1640.650882] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1640.658585] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1640.665852] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1640.673118] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1640.680390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1640.687657] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:03 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x7c030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000003f000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000001000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:03 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 21) 04:32:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000040000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1640.911048] FAULT_INJECTION: forcing a failure. [ 1640.911048] name failslab, interval 1, probability 0, space 0, times 0 [ 1640.928876] CPU: 0 PID: 29475 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1640.936775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1640.946128] Call Trace: [ 1640.948723] dump_stack+0x1fc/0x2ef [ 1640.952358] should_fail.cold+0xa/0xf [ 1640.956161] ? setup_fault_attr+0x200/0x200 [ 1640.960487] ? lock_acquire+0x170/0x3c0 [ 1640.964465] __should_failslab+0x115/0x180 [ 1640.968707] should_failslab+0x5/0x10 [ 1640.972506] kmem_cache_alloc_node+0x245/0x3b0 [ 1640.977095] __alloc_skb+0x71/0x560 [ 1640.980744] alloc_uevent_skb+0x7b/0x210 [ 1640.984814] kobject_uevent_env+0xa90/0x1480 [ 1640.989236] lo_ioctl+0xff9/0x20e0 [ 1640.992787] ? loop_set_status64+0x110/0x110 [ 1640.997205] blkdev_ioctl+0x5cb/0x1a80 [ 1641.001096] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1641.006458] ? blkpg_ioctl+0x9d0/0x9d0 [ 1641.010350] ? mark_held_locks+0xf0/0xf0 [ 1641.014413] ? mark_held_locks+0xf0/0xf0 [ 1641.018479] ? debug_check_no_obj_freed+0x201/0x490 [ 1641.023507] ? lock_downgrade+0x720/0x720 [ 1641.027664] block_ioctl+0xe9/0x130 [ 1641.031291] ? blkdev_fallocate+0x3f0/0x3f0 [ 1641.035612] do_vfs_ioctl+0xcdb/0x12e0 [ 1641.039503] ? lock_downgrade+0x720/0x720 [ 1641.043654] ? check_preemption_disabled+0x41/0x280 [ 1641.048676] ? ioctl_preallocate+0x200/0x200 [ 1641.053091] ? __fget+0x356/0x510 [ 1641.056547] ? do_dup2+0x450/0x450 [ 1641.060092] ? do_sys_open+0x2bf/0x520 [ 1641.063990] ksys_ioctl+0x9b/0xc0 [ 1641.067449] __x64_sys_ioctl+0x6f/0xb0 [ 1641.071339] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1641.075924] do_syscall_64+0xf9/0x620 [ 1641.079731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1641.084923] RIP: 0033:0x7f247ef95037 [ 1641.088637] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:32:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1641.107534] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1641.115241] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1641.122508] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1641.129775] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1641.137041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1641.144318] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffff6000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:04 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:04 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x8a020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000004000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffdfc000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 22) 04:32:04 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f0000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000006000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1641.769636] FAULT_INJECTION: forcing a failure. [ 1641.769636] name failslab, interval 1, probability 0, space 0, times 0 [ 1641.796181] CPU: 1 PID: 29516 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1641.804081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1641.813433] Call Trace: [ 1641.816025] dump_stack+0x1fc/0x2ef [ 1641.819661] should_fail.cold+0xa/0xf [ 1641.823467] ? setup_fault_attr+0x200/0x200 [ 1641.827789] ? lock_acquire+0x170/0x3c0 [ 1641.831773] __should_failslab+0x115/0x180 [ 1641.836014] should_failslab+0x5/0x10 [ 1641.839816] kmem_cache_alloc_node+0x245/0x3b0 [ 1641.844406] __alloc_skb+0x71/0x560 [ 1641.848043] alloc_uevent_skb+0x7b/0x210 [ 1641.852115] kobject_uevent_env+0xa90/0x1480 [ 1641.856536] lo_ioctl+0xff9/0x20e0 [ 1641.860087] ? loop_set_status64+0x110/0x110 [ 1641.864494] blkdev_ioctl+0x5cb/0x1a80 [ 1641.868383] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1641.873741] ? blkpg_ioctl+0x9d0/0x9d0 [ 1641.877640] ? mark_held_locks+0xf0/0xf0 [ 1641.881714] ? mark_held_locks+0xf0/0xf0 [ 1641.885795] ? debug_check_no_obj_freed+0x201/0x490 [ 1641.890905] ? lock_downgrade+0x720/0x720 [ 1641.895077] block_ioctl+0xe9/0x130 [ 1641.898703] ? blkdev_fallocate+0x3f0/0x3f0 [ 1641.903028] do_vfs_ioctl+0xcdb/0x12e0 [ 1641.906919] ? lock_downgrade+0x720/0x720 [ 1641.911069] ? check_preemption_disabled+0x41/0x280 [ 1641.916094] ? ioctl_preallocate+0x200/0x200 [ 1641.920515] ? __fget+0x356/0x510 [ 1641.923977] ? do_dup2+0x450/0x450 [ 1641.927520] ? do_sys_open+0x2bf/0x520 [ 1641.931416] ksys_ioctl+0x9b/0xc0 [ 1641.934874] __x64_sys_ioctl+0x6f/0xb0 [ 1641.938765] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1641.943354] do_syscall_64+0xf9/0x620 [ 1641.947162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1641.952348] RIP: 0033:0x7f247ef95037 04:32:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffffe000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000007000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1641.956063] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1641.974959] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1641.982674] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1641.989945] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1641.997214] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1642.004478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1642.011748] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:05 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fcfdffff000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000f6ffffff000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:05 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x8c010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000010000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 23) 04:32:05 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000feffffff000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000003f000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1642.628717] FAULT_INJECTION: forcing a failure. [ 1642.628717] name failslab, interval 1, probability 0, space 0, times 0 [ 1642.656209] CPU: 0 PID: 29558 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1642.664106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1642.673731] Call Trace: 04:32:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000200000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000040000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fffffdef000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1642.676333] dump_stack+0x1fc/0x2ef [ 1642.679978] should_fail.cold+0xa/0xf [ 1642.683792] ? setup_fault_attr+0x200/0x200 [ 1642.688118] ? lock_acquire+0x170/0x3c0 [ 1642.692107] __should_failslab+0x115/0x180 [ 1642.696350] should_failslab+0x5/0x10 [ 1642.700151] __kmalloc+0x2ab/0x3c0 [ 1642.703691] ? kobject_get_path+0xbf/0x240 [ 1642.707937] kobject_get_path+0xbf/0x240 [ 1642.712014] kobject_uevent_env+0x25c/0x1480 [ 1642.716444] lo_ioctl+0xff9/0x20e0 [ 1642.719996] ? loop_set_status64+0x110/0x110 [ 1642.724409] blkdev_ioctl+0x5cb/0x1a80 04:32:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fffffff6000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fffffdfc000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1642.728299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1642.733663] ? blkpg_ioctl+0x9d0/0x9d0 [ 1642.737558] ? mark_held_locks+0xf0/0xf0 [ 1642.741632] ? mark_held_locks+0xf0/0xf0 [ 1642.745702] ? debug_check_no_obj_freed+0x201/0x490 [ 1642.750731] ? lock_downgrade+0x720/0x720 [ 1642.754896] block_ioctl+0xe9/0x130 [ 1642.758535] ? blkdev_fallocate+0x3f0/0x3f0 [ 1642.762860] do_vfs_ioctl+0xcdb/0x12e0 [ 1642.766778] ? lock_downgrade+0x720/0x720 [ 1642.771020] ? check_preemption_disabled+0x41/0x280 [ 1642.776039] ? ioctl_preallocate+0x200/0x200 [ 1642.780456] ? __fget+0x356/0x510 [ 1642.783918] ? do_dup2+0x450/0x450 [ 1642.787464] ? do_sys_open+0x2bf/0x520 [ 1642.791357] ksys_ioctl+0x9b/0xc0 [ 1642.794813] __x64_sys_ioctl+0x6f/0xb0 [ 1642.798703] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1642.803285] do_syscall_64+0xf9/0x620 [ 1642.807087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1642.812274] RIP: 0033:0x7f247ef95037 [ 1642.815988] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1642.834883] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1642.842597] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1642.849870] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1642.857139] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1642.864411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1642.871679] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:06 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x8cffffff, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fffffffe000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000001000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 24) 04:32:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:06 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000effdffff000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1643.517669] FAULT_INJECTION: forcing a failure. [ 1643.517669] name failslab, interval 1, probability 0, space 0, times 0 [ 1643.530996] CPU: 1 PID: 29607 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1643.538899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1643.548251] Call Trace: [ 1643.550845] dump_stack+0x1fc/0x2ef [ 1643.554483] should_fail.cold+0xa/0xf [ 1643.558293] ? setup_fault_attr+0x200/0x200 [ 1643.562618] ? lock_acquire+0x170/0x3c0 [ 1643.566603] __should_failslab+0x115/0x180 [ 1643.570837] should_failslab+0x5/0x10 [ 1643.574642] kmem_cache_alloc+0x277/0x370 [ 1643.578793] skb_clone+0x151/0x3d0 [ 1643.582347] netlink_broadcast_filtered+0x8e5/0xbc0 [ 1643.587377] netlink_broadcast+0x35/0x40 [ 1643.591446] kobject_uevent_env+0xa56/0x1480 [ 1643.595871] lo_ioctl+0xff9/0x20e0 [ 1643.599423] ? loop_set_status64+0x110/0x110 [ 1643.603839] blkdev_ioctl+0x5cb/0x1a80 [ 1643.607737] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1643.613101] ? blkpg_ioctl+0x9d0/0x9d0 [ 1643.616995] ? mark_held_locks+0xf0/0xf0 [ 1643.621060] ? mark_held_locks+0xf0/0xf0 [ 1643.625124] ? debug_check_no_obj_freed+0x201/0x490 [ 1643.630150] ? lock_downgrade+0x720/0x720 [ 1643.634299] block_ioctl+0xe9/0x130 [ 1643.637922] ? blkdev_fallocate+0x3f0/0x3f0 [ 1643.642249] do_vfs_ioctl+0xcdb/0x12e0 [ 1643.646146] ? lock_downgrade+0x720/0x720 [ 1643.650298] ? check_preemption_disabled+0x41/0x280 [ 1643.655314] ? ioctl_preallocate+0x200/0x200 [ 1643.659727] ? __fget+0x356/0x510 [ 1643.663181] ? do_dup2+0x450/0x450 [ 1643.666722] ? do_sys_open+0x2bf/0x520 [ 1643.670620] ksys_ioctl+0x9b/0xc0 [ 1643.674080] __x64_sys_ioctl+0x6f/0xb0 [ 1643.677970] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1643.682556] do_syscall_64+0xf9/0x620 [ 1643.686363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1643.691552] RIP: 0033:0x7f247ef95037 [ 1643.695264] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:32:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fcfdffff000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000020000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1643.714161] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1643.721871] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1643.729137] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1643.736406] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1643.743672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1643.750943] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000010000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000f6ffffff000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000020000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:07 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:07 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x8e020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 25) 04:32:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000feffffff000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000200000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000030000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1644.428226] FAULT_INJECTION: forcing a failure. [ 1644.428226] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.456025] CPU: 1 PID: 29646 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1644.463939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1644.473291] Call Trace: [ 1644.475891] dump_stack+0x1fc/0x2ef [ 1644.479529] should_fail.cold+0xa/0xf [ 1644.483335] ? setup_fault_attr+0x200/0x200 [ 1644.487657] ? lock_acquire+0x170/0x3c0 [ 1644.491637] __should_failslab+0x115/0x180 [ 1644.495879] should_failslab+0x5/0x10 [ 1644.499685] kmem_cache_alloc+0x277/0x370 [ 1644.503840] skb_clone+0x151/0x3d0 [ 1644.507386] netlink_broadcast_filtered+0x8e5/0xbc0 [ 1644.512416] netlink_broadcast+0x35/0x40 [ 1644.516484] kobject_uevent_env+0xa56/0x1480 [ 1644.520905] lo_ioctl+0xff9/0x20e0 [ 1644.524454] ? loop_set_status64+0x110/0x110 [ 1644.528863] blkdev_ioctl+0x5cb/0x1a80 [ 1644.532753] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1644.538115] ? blkpg_ioctl+0x9d0/0x9d0 [ 1644.542004] ? mark_held_locks+0xf0/0xf0 [ 1644.546068] ? mark_held_locks+0xf0/0xf0 [ 1644.550135] ? debug_check_no_obj_freed+0x201/0x490 [ 1644.555155] ? lock_downgrade+0x720/0x720 [ 1644.559304] block_ioctl+0xe9/0x130 [ 1644.562928] ? blkdev_fallocate+0x3f0/0x3f0 [ 1644.567251] do_vfs_ioctl+0xcdb/0x12e0 [ 1644.571144] ? lock_downgrade+0x720/0x720 [ 1644.575299] ? check_preemption_disabled+0x41/0x280 [ 1644.580314] ? ioctl_preallocate+0x200/0x200 [ 1644.584730] ? __fget+0x356/0x510 [ 1644.588193] ? do_dup2+0x450/0x450 [ 1644.591729] ? do_sys_open+0x2bf/0x520 [ 1644.595627] ksys_ioctl+0x9b/0xc0 [ 1644.599093] __x64_sys_ioctl+0x6f/0xb0 [ 1644.602985] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1644.607574] do_syscall_64+0xf9/0x620 [ 1644.611386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1644.616577] RIP: 0033:0x7f247ef95037 [ 1644.620291] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1644.639201] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1644.646915] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1644.654181] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1644.661449] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1644.668717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 04:32:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000040000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000f0ffffff7f00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1644.675989] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000060000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000001000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:07 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:08 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0x97ffffff, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000100000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 26) 04:32:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000020000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:08 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000007ffffffff0000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000000000003f0000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000010000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1645.357074] FAULT_INJECTION: forcing a failure. [ 1645.357074] name failslab, interval 1, probability 0, space 0, times 0 [ 1645.389048] CPU: 1 PID: 29693 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1645.396949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1645.406304] Call Trace: [ 1645.408898] dump_stack+0x1fc/0x2ef [ 1645.412538] should_fail.cold+0xa/0xf [ 1645.416348] ? setup_fault_attr+0x200/0x200 [ 1645.420673] ? lock_acquire+0x170/0x3c0 [ 1645.424659] __should_failslab+0x115/0x180 [ 1645.428901] should_failslab+0x5/0x10 [ 1645.432703] kmem_cache_alloc_trace+0x284/0x380 [ 1645.437374] ? wait_for_completion_io+0x10/0x10 [ 1645.442045] ? kobj_ns_initial+0x90/0x90 [ 1645.446110] call_usermodehelper_setup+0x84/0x300 [ 1645.450958] kobject_uevent_env+0xe83/0x1480 [ 1645.455383] lo_ioctl+0xff9/0x20e0 [ 1645.458931] ? loop_set_status64+0x110/0x110 [ 1645.463344] blkdev_ioctl+0x5cb/0x1a80 [ 1645.467234] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1645.472598] ? blkpg_ioctl+0x9d0/0x9d0 [ 1645.476487] ? mark_held_locks+0xf0/0xf0 [ 1645.480549] ? mark_held_locks+0xf0/0xf0 [ 1645.484614] ? debug_check_no_obj_freed+0x201/0x490 [ 1645.489631] ? lock_downgrade+0x720/0x720 [ 1645.493782] block_ioctl+0xe9/0x130 [ 1645.497406] ? blkdev_fallocate+0x3f0/0x3f0 [ 1645.501727] do_vfs_ioctl+0xcdb/0x12e0 [ 1645.505618] ? lock_downgrade+0x720/0x720 [ 1645.509774] ? check_preemption_disabled+0x41/0x280 [ 1645.514797] ? ioctl_preallocate+0x200/0x200 [ 1645.519213] ? __fget+0x356/0x510 [ 1645.522670] ? do_dup2+0x450/0x450 [ 1645.526215] ? do_sys_open+0x2bf/0x520 [ 1645.530115] ksys_ioctl+0x9b/0xc0 [ 1645.533570] __x64_sys_ioctl+0x6f/0xb0 [ 1645.537462] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1645.542041] do_syscall_64+0xf9/0x620 [ 1645.545853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1645.551038] RIP: 0033:0x7f247ef95037 [ 1645.554756] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1645.573655] RSP: 002b:00007f247d909f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1645.581360] RAX: ffffffffffffffda RBX: 00007f247efdea20 RCX: 00007f247ef95037 [ 1645.588629] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1645.595895] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f247d90a1d0 04:32:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000400000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000020000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:08 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1645.603159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1645.610422] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:32:09 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xa0000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 27) 04:32:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000030000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000fffffff60000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:09 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000040000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000fffffdfc0000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000060000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1646.285510] FAULT_INJECTION: forcing a failure. [ 1646.285510] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1646.297334] CPU: 1 PID: 29738 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1646.305215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1646.314557] Call Trace: [ 1646.317140] dump_stack+0x1fc/0x2ef [ 1646.320758] should_fail.cold+0xa/0xf [ 1646.324550] ? setup_fault_attr+0x200/0x200 [ 1646.328856] ? wake_up_q+0x93/0xe0 [ 1646.332385] ? __mutex_unlock_slowpath+0x2be/0x610 [ 1646.337303] __alloc_pages_nodemask+0x239/0x2890 [ 1646.342056] ? __lock_acquire+0x6de/0x3ff0 [ 1646.346285] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1646.351111] ? blkdev_ioctl+0x11a/0x1a80 [ 1646.355159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1646.360507] ? blkpg_ioctl+0x9d0/0x9d0 [ 1646.364384] ? debug_check_no_obj_freed+0x201/0x490 [ 1646.369391] ? lock_downgrade+0x720/0x720 [ 1646.373529] cache_grow_begin+0xa4/0x8a0 [ 1646.377576] ? setup_fault_attr+0x200/0x200 [ 1646.381881] ? lock_acquire+0x170/0x3c0 [ 1646.385845] cache_alloc_refill+0x273/0x340 [ 1646.390157] kmem_cache_alloc+0x346/0x370 [ 1646.394298] getname_flags+0xce/0x590 [ 1646.398087] do_mkdirat+0x8d/0x2d0 [ 1646.401622] ? __ia32_sys_mknod+0x120/0x120 [ 1646.405929] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1646.411291] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1646.416304] ? do_syscall_64+0x21/0x620 [ 1646.420264] do_syscall_64+0xf9/0x620 [ 1646.424055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1646.429229] RIP: 0033:0x7f247ef94387 [ 1646.432929] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1646.451810] RSP: 002b:00007f247d909f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1646.459506] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef94387 [ 1646.467039] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1646.474292] RBP: 00007f247d90a1d0 R08: 0000000000000000 R09: 00007f247d90a1d0 04:32:09 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1646.481544] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1646.488797] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000fffffffe0000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000070000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1646.533601] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (29749) [ 1646.557671] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (29738) 04:32:10 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xae000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:10 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000ffffffff0000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000100000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 28) 04:32:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000020000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:10 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000003f0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000030000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1647.170747] FAULT_INJECTION: forcing a failure. [ 1647.170747] name failslab, interval 1, probability 0, space 0, times 0 [ 1647.228582] CPU: 1 PID: 29779 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1647.236503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1647.245856] Call Trace: [ 1647.248452] dump_stack+0x1fc/0x2ef [ 1647.252088] should_fail.cold+0xa/0xf [ 1647.255895] ? setup_fault_attr+0x200/0x200 [ 1647.260228] ? lock_acquire+0x170/0x3c0 [ 1647.264222] __should_failslab+0x115/0x180 [ 1647.268469] should_failslab+0x5/0x10 [ 1647.272276] kmem_cache_alloc+0x277/0x370 [ 1647.276434] getname_flags+0xce/0x590 [ 1647.280241] do_mkdirat+0x8d/0x2d0 [ 1647.283786] ? __ia32_sys_mknod+0x120/0x120 [ 1647.288111] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1647.293474] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1647.298491] ? do_syscall_64+0x21/0x620 [ 1647.302466] do_syscall_64+0xf9/0x620 [ 1647.306278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1647.311464] RIP: 0033:0x7f247ef94387 04:32:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000400000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1647.315174] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1647.334081] RSP: 002b:00007f247d909f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1647.341793] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef94387 [ 1647.349056] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1647.356326] RBP: 00007f247d90a1d0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1647.363593] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1647.370863] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:10 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xb0020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000040000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000fffffffffffffdef0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:10 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 29) 04:32:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffff60000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000060000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1648.029217] FAULT_INJECTION: forcing a failure. [ 1648.029217] name failslab, interval 1, probability 0, space 0, times 0 [ 1648.082139] CPU: 0 PID: 29828 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1648.090043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1648.099398] Call Trace: [ 1648.102000] dump_stack+0x1fc/0x2ef [ 1648.105636] should_fail.cold+0xa/0xf [ 1648.109455] ? setup_fault_attr+0x200/0x200 [ 1648.113787] __should_failslab+0x115/0x180 [ 1648.118025] should_failslab+0x5/0x10 [ 1648.121826] kmem_cache_alloc+0x277/0x370 [ 1648.125981] ? ext4_sync_fs+0x8d0/0x8d0 [ 1648.129959] ext4_alloc_inode+0x1a/0x630 [ 1648.134021] ? ext4_sync_fs+0x8d0/0x8d0 [ 1648.137994] alloc_inode+0x5d/0x180 [ 1648.141622] new_inode+0x1d/0xf0 [ 1648.144989] __ext4_new_inode+0x400/0x5a20 [ 1648.149232] ? putname+0xe1/0x120 [ 1648.152687] ? do_mkdirat+0xa0/0x2d0 [ 1648.156419] ? ext4_free_inode+0x1780/0x1780 [ 1648.160836] ? debug_check_no_obj_freed+0x201/0x490 [ 1648.165853] ? __dquot_initialize+0x298/0xb70 [ 1648.170354] ? lock_acquire+0x170/0x3c0 [ 1648.174329] ? dquot_initialize_needed+0x290/0x290 [ 1648.179260] ? trace_hardirqs_off+0x64/0x200 [ 1648.183673] ? common_perm+0x4be/0x800 [ 1648.187565] ext4_mkdir+0x396/0xe10 [ 1648.191195] ? putname+0xe1/0x120 [ 1648.194654] ? ext4_init_dot_dotdot+0x600/0x600 [ 1648.199325] ? generic_permission+0x116/0x4d0 [ 1648.203822] ? security_inode_permission+0xc5/0xf0 [ 1648.208756] ? inode_permission.part.0+0x10c/0x450 [ 1648.213693] vfs_mkdir+0x508/0x7a0 [ 1648.217234] do_mkdirat+0x262/0x2d0 [ 1648.220860] ? __ia32_sys_mknod+0x120/0x120 [ 1648.225185] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1648.230199] ? do_syscall_64+0x21/0x620 [ 1648.234174] do_syscall_64+0xf9/0x620 [ 1648.237979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1648.243165] RIP: 0033:0x7f247ef94387 [ 1648.246887] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1648.265792] RSP: 002b:00007f247d909f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1648.273505] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef94387 04:32:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffdfc0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000100000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:11 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1648.280776] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1648.288046] RBP: 00007f247d90a1d0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1648.295310] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1648.302572] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:11 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xb4000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffffe0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000300000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 30) 04:32:11 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2400, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1648.888803] FAULT_INJECTION: forcing a failure. [ 1648.888803] name failslab, interval 1, probability 0, space 0, times 0 [ 1648.911960] CPU: 0 PID: 29871 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1648.919863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1648.929215] Call Trace: [ 1648.931820] dump_stack+0x1fc/0x2ef [ 1648.935469] should_fail.cold+0xa/0xf [ 1648.939275] ? setup_fault_attr+0x200/0x200 [ 1648.943599] __should_failslab+0x115/0x180 [ 1648.947858] should_failslab+0x5/0x10 [ 1648.951648] kmem_cache_alloc+0x277/0x370 [ 1648.955782] ? ext4_sync_fs+0x8d0/0x8d0 [ 1648.959742] ext4_alloc_inode+0x1a/0x630 [ 1648.963789] ? ext4_sync_fs+0x8d0/0x8d0 [ 1648.967750] alloc_inode+0x5d/0x180 [ 1648.971361] new_inode+0x1d/0xf0 [ 1648.974714] __ext4_new_inode+0x400/0x5a20 [ 1648.978943] ? putname+0xe1/0x120 [ 1648.982382] ? do_mkdirat+0xa0/0x2d0 [ 1648.986092] ? ext4_free_inode+0x1780/0x1780 [ 1648.990488] ? debug_check_no_obj_freed+0x201/0x490 [ 1648.995504] ? __dquot_initialize+0x298/0xb70 [ 1648.999992] ? lock_acquire+0x170/0x3c0 [ 1649.003955] ? dquot_initialize_needed+0x290/0x290 [ 1649.008874] ? trace_hardirqs_off+0x64/0x200 [ 1649.013272] ? common_perm+0x4be/0x800 [ 1649.017151] ext4_mkdir+0x396/0xe10 [ 1649.020768] ? putname+0xe1/0x120 [ 1649.024214] ? ext4_init_dot_dotdot+0x600/0x600 [ 1649.028869] ? generic_permission+0x116/0x4d0 [ 1649.033353] ? security_inode_permission+0xc5/0xf0 [ 1649.038272] ? inode_permission.part.0+0x10c/0x450 [ 1649.043189] vfs_mkdir+0x508/0x7a0 [ 1649.046747] do_mkdirat+0x262/0x2d0 [ 1649.050384] ? __ia32_sys_mknod+0x120/0x120 [ 1649.054711] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1649.059729] ? do_syscall_64+0x21/0x620 [ 1649.063691] do_syscall_64+0xf9/0x620 [ 1649.067485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1649.072660] RIP: 0033:0x7f247ef94387 04:32:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000ffffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 31) [ 1649.076370] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1649.095259] RSP: 002b:00007f247d909f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1649.102952] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef94387 [ 1649.110225] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1649.117478] RBP: 00007f247d90a1d0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1649.124740] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1649.131993] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000600000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000effdffffffffffff0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1649.262157] FAULT_INJECTION: forcing a failure. [ 1649.262157] name failslab, interval 1, probability 0, space 0, times 0 [ 1649.274078] CPU: 0 PID: 29887 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1649.281958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1649.291304] Call Trace: [ 1649.293898] dump_stack+0x1fc/0x2ef [ 1649.297533] should_fail.cold+0xa/0xf [ 1649.301349] ? setup_fault_attr+0x200/0x200 [ 1649.305680] ? __es_tree_search.isra.0+0x1af/0x210 [ 1649.310620] __should_failslab+0x115/0x180 [ 1649.314866] should_failslab+0x5/0x10 [ 1649.318666] kmem_cache_alloc+0x3f/0x370 [ 1649.322727] __es_insert_extent+0x39b/0x13b0 [ 1649.327136] ? lock_acquire+0x170/0x3c0 [ 1649.331120] ? ext4_es_insert_extent+0x17e/0x5e0 [ 1649.335885] ext4_es_insert_extent+0x22e/0x5e0 [ 1649.340478] ? lock_downgrade+0x720/0x720 [ 1649.344631] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 1649.350443] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1649.355464] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 1649.361267] ext4_ext_map_blocks+0x2129/0x7390 [ 1649.365854] ? __lock_acquire+0x6de/0x3ff0 [ 1649.370102] ? __lock_acquire+0x6de/0x3ff0 [ 1649.374349] ? mark_held_locks+0xf0/0xf0 [ 1649.378412] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1649.383776] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1649.388970] ? mark_held_locks+0xf0/0xf0 [ 1649.393037] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1649.397878] ? ext4_es_lookup_extent+0x375/0xb60 [ 1649.402646] ? check_preemption_disabled+0x41/0x280 [ 1649.407674] ? lock_acquire+0x170/0x3c0 [ 1649.411655] ? ext4_map_blocks+0x33e/0x1a50 [ 1649.415988] ext4_map_blocks+0xd88/0x1a50 [ 1649.420143] ? check_preemption_disabled+0x41/0x280 [ 1649.425166] ? ext4_issue_zeroout+0x160/0x160 [ 1649.429668] ? __brelse+0x84/0xa0 [ 1649.433119] ? __ext4_new_inode+0x2eb/0x5a20 [ 1649.437536] ext4_getblk+0xad/0x4f0 [ 1649.441166] ? ext4_iomap_begin+0xe00/0xe00 [ 1649.445495] ? ext4_free_inode+0x1780/0x1780 [ 1649.449911] ? debug_check_no_obj_freed+0x201/0x490 [ 1649.454927] ? __dquot_initialize+0x298/0xb70 [ 1649.459426] ext4_bread+0x7c/0x210 04:32:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000020000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000030000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1649.462966] ? ext4_getblk+0x4f0/0x4f0 [ 1649.466858] ? dquot_initialize_needed+0x290/0x290 [ 1649.471788] ? trace_hardirqs_off+0x64/0x200 [ 1649.476200] ext4_append+0x155/0x370 [ 1649.479925] ext4_mkdir+0x5bd/0xe10 [ 1649.483560] ? ext4_init_dot_dotdot+0x600/0x600 [ 1649.488234] ? generic_permission+0x116/0x4d0 [ 1649.492738] ? inode_permission.part.0+0x10c/0x450 [ 1649.497671] vfs_mkdir+0x508/0x7a0 [ 1649.501217] do_mkdirat+0x262/0x2d0 [ 1649.504846] ? __ia32_sys_mknod+0x120/0x120 [ 1649.509170] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1649.514188] ? do_syscall_64+0x21/0x620 [ 1649.518168] do_syscall_64+0xf9/0x620 [ 1649.521976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1649.528378] RIP: 0033:0x7f247ef94387 [ 1649.532092] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1649.550991] RSP: 002b:00007f247d909f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1649.558703] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef94387 [ 1649.565979] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1649.573245] RBP: 00007f247d90a1d0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1649.580510] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1649.587780] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 [ 1649.637164] BTRFS: device fsid f90c6c04-0000-0000-8bee-4b8d3da88dc2 devid 0 transid 7 /dev/loop5 04:32:12 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xb5030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000040000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000002000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:12 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 32) 04:32:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xff0f, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000003f00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000060000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1649.874940] FAULT_INJECTION: forcing a failure. [ 1649.874940] name failslab, interval 1, probability 0, space 0, times 0 [ 1649.904769] CPU: 0 PID: 29916 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1649.912666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1649.922013] Call Trace: [ 1649.924608] dump_stack+0x1fc/0x2ef [ 1649.928244] should_fail.cold+0xa/0xf [ 1649.932053] ? setup_fault_attr+0x200/0x200 [ 1649.936375] ? __lock_acquire+0x6de/0x3ff0 [ 1649.940618] __should_failslab+0x115/0x180 [ 1649.944860] should_failslab+0x5/0x10 [ 1649.948664] __kmalloc+0x2ab/0x3c0 [ 1649.952205] ? ext4_find_extent+0x9bb/0xc70 [ 1649.956532] ext4_find_extent+0x9bb/0xc70 [ 1649.960694] ext4_ext_map_blocks+0x1c0/0x7390 [ 1649.965205] ? __lock_acquire+0x6de/0x3ff0 [ 1649.969448] ? __lock_acquire+0x6de/0x3ff0 04:32:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000070000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1649.973695] ? mark_held_locks+0xf0/0xf0 [ 1649.977764] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1649.983134] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1649.988328] ? mark_held_locks+0xf0/0xf0 [ 1649.992395] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1649.997244] ? ext4_es_lookup_extent+0x375/0xb60 [ 1650.002019] ? lock_downgrade+0x720/0x720 [ 1650.006169] ? lock_acquire+0x170/0x3c0 [ 1650.010147] ? check_preemption_disabled+0x41/0x280 [ 1650.015169] ? lock_acquire+0x170/0x3c0 [ 1650.019142] ? ext4_map_blocks+0x33e/0x1a50 [ 1650.023475] ext4_map_blocks+0xd88/0x1a50 [ 1650.027631] ? check_preemption_disabled+0x41/0x280 [ 1650.032649] ? ext4_issue_zeroout+0x160/0x160 [ 1650.037149] ? __brelse+0x84/0xa0 [ 1650.040600] ? __ext4_new_inode+0x2eb/0x5a20 [ 1650.045024] ext4_getblk+0xad/0x4f0 [ 1650.048657] ? ext4_iomap_begin+0xe00/0xe00 [ 1650.052986] ? ext4_free_inode+0x1780/0x1780 [ 1650.057396] ? debug_check_no_obj_freed+0x201/0x490 [ 1650.062415] ? __dquot_initialize+0x298/0xb70 [ 1650.066915] ext4_bread+0x7c/0x210 [ 1650.070462] ? ext4_getblk+0x4f0/0x4f0 [ 1650.074362] ? dquot_initialize_needed+0x290/0x290 [ 1650.079304] ? trace_hardirqs_off+0x64/0x200 [ 1650.083724] ext4_append+0x155/0x370 [ 1650.087454] ext4_mkdir+0x5bd/0xe10 [ 1650.091099] ? ext4_init_dot_dotdot+0x600/0x600 [ 1650.095777] ? generic_permission+0x116/0x4d0 [ 1650.100283] ? inode_permission.part.0+0x10c/0x450 [ 1650.105220] vfs_mkdir+0x508/0x7a0 [ 1650.108766] do_mkdirat+0x262/0x2d0 [ 1650.112396] ? __ia32_sys_mknod+0x120/0x120 [ 1650.116748] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1650.121775] ? do_syscall_64+0x21/0x620 [ 1650.125753] do_syscall_64+0xf9/0x620 [ 1650.129560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1650.134751] RIP: 0033:0x7f247ef94387 [ 1650.138465] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1650.157365] RSP: 002b:00007f247d909f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1650.165071] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef94387 04:32:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000004000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000100000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1650.172338] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1650.179602] RBP: 00007f247d90a1d0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1650.186868] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1650.194150] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:13 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:13 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xb8030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000300000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:13 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000002000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 33) 04:32:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42f8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000020000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1650.696072] FAULT_INJECTION: forcing a failure. [ 1650.696072] name failslab, interval 1, probability 0, space 0, times 0 [ 1650.731991] CPU: 0 PID: 29952 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 04:32:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000600000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1650.739891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1650.751152] Call Trace: [ 1650.753750] dump_stack+0x1fc/0x2ef [ 1650.757387] should_fail.cold+0xa/0xf [ 1650.761204] ? setup_fault_attr+0x200/0x200 [ 1650.765530] ? lock_downgrade+0x720/0x720 [ 1650.769682] ? check_preemption_disabled+0x41/0x280 [ 1650.774709] __should_failslab+0x115/0x180 [ 1650.778954] should_failslab+0x5/0x10 [ 1650.782756] kmem_cache_alloc+0x277/0x370 [ 1650.786916] ext4_mb_new_blocks+0x60a/0x4370 [ 1650.791342] ? retint_kernel+0x2d/0x2d 04:32:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000700000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1650.795237] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 1650.800516] ? ext4_ext_search_right+0x2c7/0xb60 [ 1650.805282] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 1650.810305] ext4_ext_map_blocks+0x2aa2/0x7390 [ 1650.814898] ? __lock_acquire+0x6de/0x3ff0 [ 1650.819141] ? mark_held_locks+0xf0/0xf0 [ 1650.823209] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1650.828575] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1650.833774] ? mark_held_locks+0xf0/0xf0 [ 1650.837840] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1650.842694] ? ext4_es_lookup_extent+0x375/0xb60 [ 1650.847455] ? ext4_map_blocks+0x59f/0x1a50 [ 1650.851796] ext4_map_blocks+0x7a2/0x1a50 [ 1650.855956] ? check_preemption_disabled+0x41/0x280 [ 1650.860981] ? ext4_issue_zeroout+0x160/0x160 [ 1650.865483] ? __brelse+0x84/0xa0 [ 1650.868942] ? __ext4_new_inode+0x2eb/0x5a20 [ 1650.873362] ext4_getblk+0xad/0x4f0 [ 1650.876984] ? ext4_iomap_begin+0xe00/0xe00 [ 1650.881316] ? ext4_free_inode+0x1780/0x1780 [ 1650.885711] ? debug_check_no_obj_freed+0x201/0x490 [ 1650.890714] ? __dquot_initialize+0x298/0xb70 [ 1650.895214] ext4_bread+0x7c/0x210 [ 1650.898738] ? ext4_getblk+0x4f0/0x4f0 [ 1650.902614] ? dquot_initialize_needed+0x290/0x290 [ 1650.907529] ? trace_hardirqs_off+0x64/0x200 [ 1650.911924] ext4_append+0x155/0x370 [ 1650.915629] ext4_mkdir+0x5bd/0xe10 [ 1650.919247] ? ext4_init_dot_dotdot+0x600/0x600 [ 1650.923901] ? generic_permission+0x116/0x4d0 [ 1650.928390] ? inode_permission.part.0+0x10c/0x450 [ 1650.933307] vfs_mkdir+0x508/0x7a0 [ 1650.936834] do_mkdirat+0x262/0x2d0 [ 1650.940446] ? __ia32_sys_mknod+0x120/0x120 [ 1650.944755] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1650.949756] ? do_syscall_64+0x21/0x620 [ 1650.953717] do_syscall_64+0xf9/0x620 [ 1650.957507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1650.962679] RIP: 0033:0x7f247ef94387 [ 1650.966380] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1650.985265] RSP: 002b:00007f247d909f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 04:32:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000002000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1650.992958] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef94387 [ 1651.000228] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1651.007569] RBP: 00007f247d90a1d0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1651.014820] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1651.022073] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 [ 1651.034221] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 04:32:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000010000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000003f00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:14 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xbb030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:14 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000020000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8502000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000004000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 34) 04:32:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fdef00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000030000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8503000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1651.603923] FAULT_INJECTION: forcing a failure. [ 1651.603923] name failslab, interval 1, probability 0, space 0, times 0 [ 1651.693839] CPU: 0 PID: 30003 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1651.701744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1651.711099] Call Trace: [ 1651.713697] dump_stack+0x1fc/0x2ef [ 1651.717333] should_fail.cold+0xa/0xf [ 1651.721147] ? setup_fault_attr+0x200/0x200 [ 1651.725469] ? lock_downgrade+0x720/0x720 [ 1651.729623] ? check_preemption_disabled+0x41/0x280 [ 1651.734650] __should_failslab+0x115/0x180 [ 1651.738898] should_failslab+0x5/0x10 [ 1651.742698] kmem_cache_alloc+0x277/0x370 [ 1651.746846] ext4_mb_new_blocks+0x60a/0x4370 [ 1651.751266] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1651.756282] ? ext4_cache_extents+0x68/0x2d0 [ 1651.760688] ? ext4_find_extent+0x9bb/0xc70 [ 1651.765016] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 1651.770289] ? ext4_ext_search_right+0x2c7/0xb60 [ 1651.775049] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 1651.780086] ext4_ext_map_blocks+0x2aa2/0x7390 [ 1651.784680] ? __lock_acquire+0x6de/0x3ff0 [ 1651.788927] ? mark_held_locks+0xf0/0xf0 [ 1651.792992] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1651.798353] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1651.803549] ? mark_held_locks+0xf0/0xf0 [ 1651.807615] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1651.812461] ? ext4_es_lookup_extent+0x375/0xb60 [ 1651.817226] ? ext4_map_blocks+0x59f/0x1a50 [ 1651.821565] ext4_map_blocks+0x7a2/0x1a50 [ 1651.825722] ? check_preemption_disabled+0x41/0x280 [ 1651.830751] ? ext4_issue_zeroout+0x160/0x160 [ 1651.835252] ? __brelse+0x84/0xa0 [ 1651.838704] ? __ext4_new_inode+0x2eb/0x5a20 [ 1651.843120] ext4_getblk+0xad/0x4f0 [ 1651.846751] ? ext4_iomap_begin+0xe00/0xe00 [ 1651.851084] ? ext4_free_inode+0x1780/0x1780 [ 1651.855499] ? debug_check_no_obj_freed+0x201/0x490 [ 1651.860522] ? __dquot_initialize+0x298/0xb70 [ 1651.865028] ext4_bread+0x7c/0x210 [ 1651.868574] ? ext4_getblk+0x4f0/0x4f0 [ 1651.872466] ? dquot_initialize_needed+0x290/0x290 [ 1651.877401] ? trace_hardirqs_off+0x64/0x200 [ 1651.881816] ext4_append+0x155/0x370 [ 1651.885539] ext4_mkdir+0x5bd/0xe10 [ 1651.889176] ? ext4_init_dot_dotdot+0x600/0x600 04:32:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000effd00000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1651.893848] ? generic_permission+0x116/0x4d0 [ 1651.898351] ? inode_permission.part.0+0x10c/0x450 [ 1651.903283] vfs_mkdir+0x508/0x7a0 [ 1651.906832] do_mkdirat+0x262/0x2d0 [ 1651.910464] ? __ia32_sys_mknod+0x120/0x120 [ 1651.914792] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1651.919813] ? do_syscall_64+0x21/0x620 [ 1651.923792] do_syscall_64+0xf9/0x620 [ 1651.927601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1651.932789] RIP: 0033:0x7f247ef94387 [ 1651.936504] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1651.955489] RSP: 002b:00007f247d909f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1651.963194] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef94387 [ 1651.970458] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 1651.977725] RBP: 00007f247d90a1d0 R08: 0000000000000000 R09: 00007f247d90a1d0 [ 1651.984992] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 04:32:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000040000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:15 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1651.992260] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:15 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xc0ed0000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8504000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:15 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000060000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 35) 04:32:15 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000100000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000020000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000003f0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1652.558617] FAULT_INJECTION: forcing a failure. [ 1652.558617] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.600664] CPU: 0 PID: 30051 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1652.608579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1652.617934] Call Trace: [ 1652.620545] dump_stack+0x1fc/0x2ef [ 1652.624181] should_fail.cold+0xa/0xf [ 1652.627990] ? setup_fault_attr+0x200/0x200 [ 1652.632319] ? lock_acquire+0x170/0x3c0 [ 1652.636306] __should_failslab+0x115/0x180 [ 1652.640550] should_failslab+0x5/0x10 [ 1652.644359] __kmalloc_track_caller+0x2a6/0x3c0 [ 1652.649036] ? strndup_user+0x70/0x120 [ 1652.652931] memdup_user+0x22/0xb0 [ 1652.656476] strndup_user+0x70/0x120 [ 1652.660199] ksys_mount+0x34/0x130 [ 1652.663747] __x64_sys_mount+0xba/0x150 [ 1652.667728] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1652.672310] do_syscall_64+0xf9/0x620 [ 1652.676120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1652.681308] RIP: 0033:0x7f247ef967aa 04:32:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000010000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000400000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1652.685024] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1652.703922] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1652.711632] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1652.718907] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1652.727216] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1652.734484] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1652.741750] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:16 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xd2000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8505000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:16 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffff60000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000020000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 36) 04:32:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000030000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffdfc0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1653.444313] FAULT_INJECTION: forcing a failure. [ 1653.444313] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.505518] CPU: 0 PID: 30092 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1653.513423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1653.522777] Call Trace: [ 1653.525377] dump_stack+0x1fc/0x2ef [ 1653.529015] should_fail.cold+0xa/0xf [ 1653.532827] ? setup_fault_attr+0x200/0x200 [ 1653.537157] ? lock_acquire+0x170/0x3c0 [ 1653.541142] __should_failslab+0x115/0x180 [ 1653.545384] should_failslab+0x5/0x10 [ 1653.549189] __kmalloc_track_caller+0x2a6/0x3c0 [ 1653.553866] ? strndup_user+0x70/0x120 [ 1653.557762] memdup_user+0x22/0xb0 [ 1653.561305] strndup_user+0x70/0x120 [ 1653.565017] ksys_mount+0x34/0x130 [ 1653.568554] __x64_sys_mount+0xba/0x150 [ 1653.572548] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1653.577116] do_syscall_64+0xf9/0x620 [ 1653.580907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1653.586082] RIP: 0033:0x7f247ef967aa 04:32:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8506000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000040000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1653.589782] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1653.608667] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1653.616359] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1653.623611] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1653.630864] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1653.638117] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1653.645368] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000060000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 37) [ 1653.828489] FAULT_INJECTION: forcing a failure. [ 1653.828489] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.841592] CPU: 0 PID: 30122 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1653.849485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1653.858847] Call Trace: [ 1653.861446] dump_stack+0x1fc/0x2ef [ 1653.865089] should_fail.cold+0xa/0xf [ 1653.868894] ? setup_fault_attr+0x200/0x200 [ 1653.873220] ? lock_acquire+0x170/0x3c0 [ 1653.877210] __should_failslab+0x115/0x180 [ 1653.881453] should_failslab+0x5/0x10 [ 1653.885253] kmem_cache_alloc_trace+0x284/0x380 [ 1653.889921] ? _copy_from_user+0xd2/0x130 [ 1653.894071] copy_mount_options+0x59/0x380 [ 1653.898313] ksys_mount+0x9b/0x130 [ 1653.901861] __x64_sys_mount+0xba/0x150 [ 1653.905843] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1653.910434] do_syscall_64+0xf9/0x620 [ 1653.914244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1653.919430] RIP: 0033:0x7f247ef967aa [ 1653.923149] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1653.942049] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1653.949760] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1653.957027] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1653.964294] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1653.971564] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1653.978834] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:17 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xd2030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:17 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffffe0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000070000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8507000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 38) 04:32:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000100000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fcfdffff0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1654.406676] FAULT_INJECTION: forcing a failure. [ 1654.406676] name failslab, interval 1, probability 0, space 0, times 0 [ 1654.434617] CPU: 0 PID: 30141 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1654.434625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 04:32:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000003f0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1654.434631] Call Trace: [ 1654.434652] dump_stack+0x1fc/0x2ef [ 1654.434672] should_fail.cold+0xa/0xf [ 1654.434689] ? setup_fault_attr+0x200/0x200 [ 1654.434706] ? lock_acquire+0x170/0x3c0 [ 1654.434728] __should_failslab+0x115/0x180 04:32:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000f6ffffff0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1654.434745] should_failslab+0x5/0x10 [ 1654.434759] kmem_cache_alloc+0x277/0x370 [ 1654.434776] alloc_vfsmnt+0x23/0x780 [ 1654.434789] ? _raw_read_unlock+0x29/0x40 [ 1654.434815] vfs_kern_mount.part.0+0x27/0x470 04:32:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000400000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1654.434834] do_mount+0x115c/0x2f50 [ 1654.434852] ? cmp_ex_sort+0xc0/0xc0 [ 1654.434868] ? __do_page_fault+0x180/0xd60 [ 1654.434884] ? copy_mount_string+0x40/0x40 [ 1654.434906] ? memset+0x20/0x40 [ 1654.434921] ? copy_mount_options+0x26f/0x380 04:32:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000feffffff0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1654.434938] ksys_mount+0xcf/0x130 [ 1654.434953] __x64_sys_mount+0xba/0x150 [ 1654.434969] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1654.434983] do_syscall_64+0xf9/0x620 [ 1654.435000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1654.435011] RIP: 0033:0x7f247ef967aa [ 1654.435024] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1654.435031] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1654.435045] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1654.435054] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1654.435062] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1654.435071] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1654.435079] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:18 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xd3010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffdef0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000002000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 39) 04:32:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8508000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:18 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1655.247016] FAULT_INJECTION: forcing a failure. [ 1655.247016] name failslab, interval 1, probability 0, space 0, times 0 [ 1655.259706] CPU: 0 PID: 30171 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1655.267603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1655.276959] Call Trace: [ 1655.279552] dump_stack+0x1fc/0x2ef [ 1655.283190] should_fail.cold+0xa/0xf [ 1655.287000] ? setup_fault_attr+0x200/0x200 [ 1655.291325] ? lock_acquire+0x170/0x3c0 [ 1655.295305] __should_failslab+0x115/0x180 [ 1655.299545] should_failslab+0x5/0x10 [ 1655.303355] kmem_cache_alloc_trace+0x284/0x380 [ 1655.308025] ? _copy_from_user+0xd2/0x130 [ 1655.312180] copy_mount_options+0x59/0x380 [ 1655.316426] ksys_mount+0x9b/0x130 [ 1655.319972] __x64_sys_mount+0xba/0x150 [ 1655.323954] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1655.328542] do_syscall_64+0xf9/0x620 [ 1655.332350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1655.337538] RIP: 0033:0x7f247ef967aa [ 1655.341251] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1655.360152] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1655.367863] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1655.375136] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1655.382409] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1655.389679] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 04:32:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffff60000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000010000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1655.396945] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8509000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:18 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffdfc0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000200000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:19 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xd6000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8510000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:19 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000100000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffffe0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 40) 04:32:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8523000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000effdffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000200000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1656.333755] FAULT_INJECTION: forcing a failure. [ 1656.333755] name failslab, interval 1, probability 0, space 0, times 0 04:32:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fcfdffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1656.385574] CPU: 1 PID: 30228 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1656.393476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1656.402830] Call Trace: [ 1656.405427] dump_stack+0x1fc/0x2ef [ 1656.409066] should_fail.cold+0xa/0xf [ 1656.412878] ? setup_fault_attr+0x200/0x200 [ 1656.417205] ? lock_acquire+0x170/0x3c0 [ 1656.421192] __should_failslab+0x115/0x180 [ 1656.425442] should_failslab+0x5/0x10 [ 1656.429246] kmem_cache_alloc+0x277/0x370 04:32:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000300000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1656.433405] getname_flags+0xce/0x590 [ 1656.437217] user_path_at_empty+0x2a/0x50 [ 1656.441368] do_mount+0x147/0x2f50 [ 1656.444910] ? cmp_ex_sort+0xc0/0xc0 [ 1656.448629] ? __do_page_fault+0x180/0xd60 [ 1656.452866] ? copy_mount_string+0x40/0x40 [ 1656.457116] ? memset+0x20/0x40 [ 1656.460407] ? copy_mount_options+0x26f/0x380 [ 1656.464915] ksys_mount+0xcf/0x130 [ 1656.468463] __x64_sys_mount+0xba/0x150 [ 1656.472445] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1656.477029] do_syscall_64+0xf9/0x620 [ 1656.480838] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:32:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000f6ffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1656.486028] RIP: 0033:0x7f247ef967aa [ 1656.489745] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1656.508645] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1656.516354] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1656.523621] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1656.530890] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1656.538165] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1656.545435] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xe2000000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000400000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:20 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000feffffff0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8548000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 41) [ 1657.276321] FAULT_INJECTION: forcing a failure. [ 1657.276321] name failslab, interval 1, probability 0, space 0, times 0 [ 1657.294610] CPU: 1 PID: 30270 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1657.302518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1657.311874] Call Trace: [ 1657.314471] dump_stack+0x1fc/0x2ef [ 1657.318109] should_fail.cold+0xa/0xf [ 1657.321920] ? setup_fault_attr+0x200/0x200 04:32:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000600000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000002000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1657.326600] ? lock_acquire+0x170/0x3c0 [ 1657.330601] __should_failslab+0x115/0x180 [ 1657.334849] should_failslab+0x5/0x10 [ 1657.338654] __kmalloc_track_caller+0x2a6/0x3c0 [ 1657.343332] ? kstrdup_const+0x53/0x80 [ 1657.347237] kstrdup+0x36/0x70 [ 1657.350440] kstrdup_const+0x53/0x80 [ 1657.354160] alloc_vfsmnt+0xb5/0x780 [ 1657.357881] vfs_kern_mount.part.0+0x27/0x470 [ 1657.362385] ? kfree+0x110/0x210 [ 1657.365762] vfs_kern_mount+0x3c/0x60 [ 1657.369573] btrfs_mount+0x23a/0xaa0 [ 1657.373298] ? btrfs_show_options+0xfd0/0xfd0 [ 1657.377798] ? __mutex_unlock_slowpath+0xea/0x610 [ 1657.382652] ? check_preemption_disabled+0x41/0x280 [ 1657.387682] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1657.392706] ? pcpu_alloc+0xc9/0x1190 [ 1657.396516] ? __lockdep_init_map+0x100/0x5a0 [ 1657.401019] mount_fs+0xa3/0x310 [ 1657.404399] vfs_kern_mount.part.0+0x68/0x470 [ 1657.408904] do_mount+0x115c/0x2f50 [ 1657.412541] ? cmp_ex_sort+0xc0/0xc0 [ 1657.416264] ? __do_page_fault+0x180/0xd60 [ 1657.420502] ? copy_mount_string+0x40/0x40 [ 1657.424752] ? memset+0x20/0x40 [ 1657.428040] ? copy_mount_options+0x26f/0x380 [ 1657.432542] ksys_mount+0xcf/0x130 [ 1657.436089] __x64_sys_mount+0xba/0x150 [ 1657.440072] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1657.444656] do_syscall_64+0xf9/0x620 [ 1657.448466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1657.453652] RIP: 0033:0x7f247ef967aa [ 1657.457364] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:32:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000f0ffffff7f000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1657.476261] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1657.483970] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1657.491239] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1657.498523] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1657.505794] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1657.513069] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000001000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e854c000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:20 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:21 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xe4010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 42) 04:32:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000003f00000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000010000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8568000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:21 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000004000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1658.210243] FAULT_INJECTION: forcing a failure. [ 1658.210243] name failslab, interval 1, probability 0, space 0, times 0 [ 1658.228470] CPU: 1 PID: 30318 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1658.236366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1658.245719] Call Trace: [ 1658.248319] dump_stack+0x1fc/0x2ef [ 1658.251958] should_fail.cold+0xa/0xf [ 1658.255772] ? setup_fault_attr+0x200/0x200 [ 1658.260103] ? lock_acquire+0x170/0x3c0 [ 1658.264090] __should_failslab+0x115/0x180 [ 1658.268340] should_failslab+0x5/0x10 [ 1658.272147] __kmalloc_track_caller+0x2a6/0x3c0 [ 1658.276821] ? btrfs_mount+0xb5/0xaa0 [ 1658.280631] kstrdup+0x36/0x70 [ 1658.283835] btrfs_mount+0xb5/0xaa0 [ 1658.287481] ? btrfs_show_options+0xfd0/0xfd0 [ 1658.292037] ? __mutex_unlock_slowpath+0xea/0x610 [ 1658.296902] ? check_preemption_disabled+0x41/0x280 [ 1658.301935] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1658.306954] ? pcpu_alloc+0xc9/0x1190 04:32:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000000000fffffff600000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1658.310760] ? __lockdep_init_map+0x100/0x5a0 [ 1658.315265] mount_fs+0xa3/0x310 [ 1658.318645] vfs_kern_mount.part.0+0x68/0x470 [ 1658.323151] do_mount+0x115c/0x2f50 [ 1658.326781] ? cmp_ex_sort+0xc0/0xc0 [ 1658.330502] ? __do_page_fault+0x180/0xd60 [ 1658.334743] ? copy_mount_string+0x40/0x40 [ 1658.338998] ? memset+0x20/0x40 [ 1658.342290] ? copy_mount_options+0x26f/0x380 [ 1658.346792] ksys_mount+0xcf/0x130 [ 1658.350340] __x64_sys_mount+0xba/0x150 [ 1658.354318] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1658.358905] do_syscall_64+0xf9/0x620 [ 1658.362712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1658.367906] RIP: 0033:0x7f247ef967aa [ 1658.371625] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1658.390537] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1658.398249] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa 04:32:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000200000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000000000fffffdfc00000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1658.405520] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1658.412787] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1658.420057] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1658.427325] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 43) 04:32:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e856c000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1658.602773] FAULT_INJECTION: forcing a failure. [ 1658.602773] name failslab, interval 1, probability 0, space 0, times 0 [ 1658.614620] CPU: 1 PID: 30344 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1658.622520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1658.631873] Call Trace: [ 1658.634455] dump_stack+0x1fc/0x2ef [ 1658.638075] should_fail.cold+0xa/0xf [ 1658.641892] ? setup_fault_attr+0x200/0x200 [ 1658.646214] ? lock_acquire+0x170/0x3c0 [ 1658.650182] __should_failslab+0x115/0x180 [ 1658.654405] should_failslab+0x5/0x10 [ 1658.658206] __kmalloc_track_caller+0x2a6/0x3c0 [ 1658.662874] ? kstrdup_const+0x53/0x80 [ 1658.666752] kstrdup+0x36/0x70 [ 1658.669936] kstrdup_const+0x53/0x80 [ 1658.673637] alloc_vfsmnt+0xb5/0x780 [ 1658.677345] vfs_kern_mount.part.0+0x27/0x470 [ 1658.681825] ? kfree+0x110/0x210 [ 1658.685179] vfs_kern_mount+0x3c/0x60 [ 1658.688973] btrfs_mount+0x23a/0xaa0 [ 1658.692706] ? btrfs_show_options+0xfd0/0xfd0 [ 1658.697185] ? __mutex_unlock_slowpath+0xea/0x610 [ 1658.702017] ? check_preemption_disabled+0x41/0x280 [ 1658.707028] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1658.712030] ? pcpu_alloc+0xc9/0x1190 [ 1658.715817] ? __lockdep_init_map+0x100/0x5a0 [ 1658.720300] mount_fs+0xa3/0x310 [ 1658.723659] vfs_kern_mount.part.0+0x68/0x470 [ 1658.728144] do_mount+0x115c/0x2f50 [ 1658.731762] ? cmp_ex_sort+0xc0/0xc0 [ 1658.735463] ? __do_page_fault+0x180/0xd60 [ 1658.739693] ? copy_mount_string+0x40/0x40 [ 1658.743929] ? memset+0x20/0x40 [ 1658.747196] ? copy_mount_options+0x26f/0x380 [ 1658.751689] ksys_mount+0xcf/0x130 [ 1658.755225] __x64_sys_mount+0xba/0x150 [ 1658.759188] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1658.763753] do_syscall_64+0xf9/0x620 [ 1658.767544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1658.772737] RIP: 0033:0x7f247ef967aa [ 1658.776436] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1658.795321] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1658.803021] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1658.810272] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1658.817523] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1658.824774] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1658.832026] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:22 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xe4020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000007ffffffff00000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:22 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000000000fffffffe00000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 44) 04:32:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8574000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:22 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000000000ffffffff00000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000100000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1659.241615] FAULT_INJECTION: forcing a failure. [ 1659.241615] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.262432] CPU: 0 PID: 30372 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1659.270515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1659.279871] Call Trace: [ 1659.282465] dump_stack+0x1fc/0x2ef [ 1659.286102] should_fail.cold+0xa/0xf [ 1659.289917] ? setup_fault_attr+0x200/0x200 [ 1659.294240] ? lock_acquire+0x170/0x3c0 [ 1659.298237] __should_failslab+0x115/0x180 [ 1659.302477] should_failslab+0x5/0x10 [ 1659.306292] __kmalloc_track_caller+0x2a6/0x3c0 [ 1659.310980] ? kstrdup_const+0x53/0x80 [ 1659.314887] kstrdup+0x36/0x70 [ 1659.318087] kstrdup_const+0x53/0x80 [ 1659.321812] alloc_vfsmnt+0xb5/0x780 [ 1659.325532] vfs_kern_mount.part.0+0x27/0x470 [ 1659.330045] ? kfree+0x110/0x210 [ 1659.333421] vfs_kern_mount+0x3c/0x60 [ 1659.337233] btrfs_mount+0x23a/0xaa0 [ 1659.340951] ? btrfs_show_options+0xfd0/0xfd0 [ 1659.345443] ? __mutex_unlock_slowpath+0xea/0x610 [ 1659.350408] ? check_preemption_disabled+0x41/0x280 [ 1659.355467] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1659.360491] ? pcpu_alloc+0xc9/0x1190 [ 1659.364298] ? __lockdep_init_map+0x100/0x5a0 [ 1659.368810] mount_fs+0xa3/0x310 [ 1659.372185] vfs_kern_mount.part.0+0x68/0x470 [ 1659.376692] do_mount+0x115c/0x2f50 [ 1659.380326] ? cmp_ex_sort+0xc0/0xc0 [ 1659.384052] ? __do_page_fault+0x180/0xd60 [ 1659.388296] ? copy_mount_string+0x40/0x40 [ 1659.392548] ? memset+0x20/0x40 [ 1659.395858] ? copy_mount_options+0x26f/0x380 [ 1659.400362] ksys_mount+0xcf/0x130 [ 1659.403910] __x64_sys_mount+0xba/0x150 [ 1659.407889] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1659.412473] do_syscall_64+0xf9/0x620 [ 1659.416281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.421475] RIP: 0033:0x7f247ef967aa 04:32:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000200000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:22 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1659.425188] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1659.444086] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1659.451801] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1659.459072] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1659.466339] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1659.473609] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1659.480875] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000200000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1659.505350] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by systemd-udevd (30367) 04:32:23 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xe4030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000300000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000300000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e857a000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 45) 04:32:23 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000400000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000400000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:23 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1660.137745] FAULT_INJECTION: forcing a failure. [ 1660.137745] name failslab, interval 1, probability 0, space 0, times 0 [ 1660.179596] CPU: 0 PID: 30415 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1660.187505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1660.196863] Call Trace: [ 1660.199464] dump_stack+0x1fc/0x2ef [ 1660.203096] should_fail.cold+0xa/0xf [ 1660.206900] ? setup_fault_attr+0x200/0x200 [ 1660.211228] ? lock_acquire+0x170/0x3c0 [ 1660.215226] __should_failslab+0x115/0x180 [ 1660.219466] should_failslab+0x5/0x10 [ 1660.223267] kmem_cache_alloc+0x277/0x370 [ 1660.227419] alloc_vfsmnt+0x23/0x780 [ 1660.231136] vfs_kern_mount.part.0+0x27/0x470 [ 1660.235633] ? kfree+0x110/0x210 [ 1660.239012] vfs_kern_mount+0x3c/0x60 [ 1660.242821] btrfs_mount+0x23a/0xaa0 [ 1660.246542] ? btrfs_show_options+0xfd0/0xfd0 [ 1660.251033] ? __mutex_unlock_slowpath+0xea/0x610 [ 1660.255885] ? check_preemption_disabled+0x41/0x280 [ 1660.260922] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1660.265943] ? pcpu_alloc+0xc9/0x1190 [ 1660.269753] ? __lockdep_init_map+0x100/0x5a0 [ 1660.274257] mount_fs+0xa3/0x310 [ 1660.277634] vfs_kern_mount.part.0+0x68/0x470 [ 1660.282139] do_mount+0x115c/0x2f50 [ 1660.285771] ? cmp_ex_sort+0xc0/0xc0 [ 1660.289496] ? __do_page_fault+0x180/0xd60 [ 1660.293736] ? copy_mount_string+0x40/0x40 [ 1660.298013] ? memset+0x20/0x40 [ 1660.301301] ? copy_mount_options+0x26f/0x380 [ 1660.305813] ksys_mount+0xcf/0x130 [ 1660.309358] __x64_sys_mount+0xba/0x150 [ 1660.313336] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1660.317924] do_syscall_64+0xf9/0x620 [ 1660.321788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1660.326977] RIP: 0033:0x7f247ef967aa [ 1660.330691] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1660.349589] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1660.357302] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1660.364573] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1660.371839] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 04:32:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000600000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500030000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1660.379108] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1660.386377] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000600000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:23 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf0020000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:23 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000700000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500050000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000001000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 46) 04:32:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000003000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000006000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1661.040235] FAULT_INJECTION: forcing a failure. [ 1661.040235] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.070518] CPU: 1 PID: 30459 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1661.078418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1661.087776] Call Trace: [ 1661.090374] dump_stack+0x1fc/0x2ef [ 1661.094017] should_fail.cold+0xa/0xf [ 1661.097829] ? setup_fault_attr+0x200/0x200 [ 1661.102163] ? lock_acquire+0x170/0x3c0 [ 1661.106155] __should_failslab+0x115/0x180 [ 1661.110401] should_failslab+0x5/0x10 [ 1661.114219] kmem_cache_alloc_trace+0x284/0x380 [ 1661.118899] btrfs_mount_root+0x188/0x1830 [ 1661.123155] ? btrfs_decode_error+0x70/0x70 [ 1661.127487] ? __mutex_unlock_slowpath+0xea/0x610 [ 1661.132339] ? check_preemption_disabled+0x41/0x280 04:32:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000020000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1661.137369] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1661.142392] ? pcpu_alloc+0xc9/0x1190 [ 1661.146205] ? __lockdep_init_map+0x100/0x5a0 [ 1661.150709] mount_fs+0xa3/0x310 [ 1661.154090] vfs_kern_mount.part.0+0x68/0x470 [ 1661.158590] ? kfree+0x110/0x210 [ 1661.161968] vfs_kern_mount+0x3c/0x60 [ 1661.165775] btrfs_mount+0x23a/0xaa0 [ 1661.169505] ? btrfs_show_options+0xfd0/0xfd0 [ 1661.174005] ? __mutex_unlock_slowpath+0xea/0x610 [ 1661.178864] ? check_preemption_disabled+0x41/0x280 [ 1661.183889] ? rcu_read_lock_sched_held+0x16c/0x1d0 04:32:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000003f000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1661.188910] ? pcpu_alloc+0xc9/0x1190 [ 1661.192719] ? __lockdep_init_map+0x100/0x5a0 [ 1661.197224] mount_fs+0xa3/0x310 [ 1661.200611] vfs_kern_mount.part.0+0x68/0x470 [ 1661.205114] do_mount+0x115c/0x2f50 [ 1661.208746] ? cmp_ex_sort+0xc0/0xc0 [ 1661.212469] ? __do_page_fault+0x180/0xd60 [ 1661.216714] ? copy_mount_string+0x40/0x40 [ 1661.220960] ? memset+0x20/0x40 [ 1661.224245] ? copy_mount_options+0x26f/0x380 [ 1661.228750] ksys_mount+0xcf/0x130 [ 1661.232303] __x64_sys_mount+0xba/0x150 [ 1661.236285] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1661.240870] do_syscall_64+0xf9/0x620 [ 1661.244682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1661.249873] RIP: 0033:0x7f247ef967aa [ 1661.253587] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1661.272489] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1661.280203] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa 04:32:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000001000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000040000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1661.287474] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1661.294747] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1661.302015] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1661.309283] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:24 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf0030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:24 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4d91bffa, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500060000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000003f00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000020000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 47) [ 1661.898223] FAULT_INJECTION: forcing a failure. [ 1661.898223] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.947757] CPU: 0 PID: 30494 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1661.955687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1661.965043] Call Trace: [ 1661.967652] dump_stack+0x1fc/0x2ef [ 1661.971304] should_fail.cold+0xa/0xf [ 1661.975122] ? setup_fault_attr+0x200/0x200 [ 1661.979451] ? lock_acquire+0x170/0x3c0 [ 1661.983440] __should_failslab+0x115/0x180 [ 1661.987681] should_failslab+0x5/0x10 [ 1661.991485] kmem_cache_alloc_trace+0x284/0x380 [ 1661.996162] btrfs_mount_root+0x188/0x1830 [ 1662.000418] ? btrfs_decode_error+0x70/0x70 [ 1662.004744] ? __mutex_unlock_slowpath+0xea/0x610 [ 1662.009597] ? check_preemption_disabled+0x41/0x280 [ 1662.014635] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1662.019656] ? pcpu_alloc+0xc9/0x1190 [ 1662.023466] ? __lockdep_init_map+0x100/0x5a0 [ 1662.027967] mount_fs+0xa3/0x310 [ 1662.031344] vfs_kern_mount.part.0+0x68/0x470 [ 1662.035855] ? kfree+0x110/0x210 [ 1662.039237] vfs_kern_mount+0x3c/0x60 [ 1662.043045] btrfs_mount+0x23a/0xaa0 [ 1662.046767] ? btrfs_show_options+0xfd0/0xfd0 [ 1662.051269] ? __mutex_unlock_slowpath+0xea/0x610 [ 1662.056122] ? check_preemption_disabled+0x41/0x280 [ 1662.061154] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1662.066186] ? pcpu_alloc+0xc9/0x1190 [ 1662.069998] ? __lockdep_init_map+0x100/0x5a0 [ 1662.074498] mount_fs+0xa3/0x310 [ 1662.077877] vfs_kern_mount.part.0+0x68/0x470 [ 1662.082383] do_mount+0x115c/0x2f50 [ 1662.086020] ? cmp_ex_sort+0xc0/0xc0 [ 1662.089745] ? __do_page_fault+0x180/0xd60 [ 1662.093983] ? copy_mount_string+0x40/0x40 [ 1662.098231] ? memset+0x20/0x40 [ 1662.101515] ? copy_mount_options+0x26f/0x380 [ 1662.106022] ksys_mount+0xcf/0x130 [ 1662.109571] __x64_sys_mount+0xba/0x150 [ 1662.113554] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1662.118148] do_syscall_64+0xf9/0x620 [ 1662.121954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1662.127142] RIP: 0033:0x7f247ef967aa 04:32:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000200000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500070000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1662.130855] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1662.149751] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1662.157456] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1662.164721] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1662.171991] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1662.179268] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1662.186544] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000004000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:25 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000100000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000fffffffffffffdef00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:25 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf5ffffff, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 48) 04:32:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000200000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fffffff600000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500090000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:25 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1662.866385] FAULT_INJECTION: forcing a failure. [ 1662.866385] name failslab, interval 1, probability 0, space 0, times 0 [ 1662.923848] CPU: 1 PID: 30542 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1662.931759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1662.941115] Call Trace: [ 1662.943717] dump_stack+0x1fc/0x2ef [ 1662.947350] should_fail.cold+0xa/0xf [ 1662.951153] ? setup_fault_attr+0x200/0x200 [ 1662.955469] ? lock_acquire+0x170/0x3c0 [ 1662.959440] __should_failslab+0x115/0x180 [ 1662.963665] should_failslab+0x5/0x10 [ 1662.967456] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1662.972553] __kmalloc_node+0x38/0x70 [ 1662.976346] kvmalloc_node+0xb4/0xf0 [ 1662.980143] btrfs_mount_root+0x13f/0x1830 [ 1662.984377] ? btrfs_decode_error+0x70/0x70 [ 1662.988688] ? __mutex_unlock_slowpath+0xea/0x610 [ 1662.993527] ? check_preemption_disabled+0x41/0x280 [ 1662.998539] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1663.003546] ? pcpu_alloc+0xc9/0x1190 [ 1663.007336] ? __lockdep_init_map+0x100/0x5a0 [ 1663.011822] mount_fs+0xa3/0x310 [ 1663.015183] vfs_kern_mount.part.0+0x68/0x470 [ 1663.019666] ? kfree+0x110/0x210 [ 1663.023026] vfs_kern_mount+0x3c/0x60 [ 1663.026815] btrfs_mount+0x23a/0xaa0 [ 1663.030518] ? btrfs_show_options+0xfd0/0xfd0 [ 1663.035001] ? __mutex_unlock_slowpath+0xea/0x610 [ 1663.039843] ? check_preemption_disabled+0x41/0x280 [ 1663.044857] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1663.049862] ? pcpu_alloc+0xc9/0x1190 [ 1663.053652] ? __lockdep_init_map+0x100/0x5a0 [ 1663.058140] mount_fs+0xa3/0x310 [ 1663.061498] vfs_kern_mount.part.0+0x68/0x470 [ 1663.065984] do_mount+0x115c/0x2f50 [ 1663.069611] ? cmp_ex_sort+0xc0/0xc0 [ 1663.073316] ? __do_page_fault+0x180/0xd60 [ 1663.077540] ? copy_mount_string+0x40/0x40 [ 1663.081768] ? memset+0x20/0x40 [ 1663.085055] ? copy_mount_options+0x26f/0x380 [ 1663.089543] ksys_mount+0xcf/0x130 [ 1663.093088] __x64_sys_mount+0xba/0x150 [ 1663.097054] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1663.101624] do_syscall_64+0xf9/0x620 [ 1663.105415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1663.110590] RIP: 0033:0x7f247ef967aa [ 1663.114298] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1663.133183] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1663.140894] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1663.148151] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1663.155409] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1663.162663] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 04:32:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fffffdfc00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1663.169917] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000300000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000fffffffe00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000400000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000ffffffff00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000600000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf6010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000effdffffffffffff00000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:26 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000001000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 49) 04:32:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85001f0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000200000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:26 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000003f00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000300000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1663.782912] FAULT_INJECTION: forcing a failure. [ 1663.782912] name failslab, interval 1, probability 0, space 0, times 0 [ 1663.841565] CPU: 0 PID: 30588 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1663.849476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1663.858829] Call Trace: [ 1663.861423] dump_stack+0x1fc/0x2ef [ 1663.865050] should_fail.cold+0xa/0xf [ 1663.868844] ? setup_fault_attr+0x200/0x200 [ 1663.873158] ? lock_acquire+0x170/0x3c0 [ 1663.877126] __should_failslab+0x115/0x180 [ 1663.881353] should_failslab+0x5/0x10 [ 1663.885144] kmem_cache_alloc_trace+0x284/0x380 [ 1663.889808] btrfs_mount_root+0x188/0x1830 [ 1663.894189] ? btrfs_decode_error+0x70/0x70 [ 1663.898505] ? __mutex_unlock_slowpath+0xea/0x610 [ 1663.903359] ? check_preemption_disabled+0x41/0x280 [ 1663.908372] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1663.913380] ? pcpu_alloc+0xc9/0x1190 [ 1663.917173] ? __lockdep_init_map+0x100/0x5a0 [ 1663.921662] mount_fs+0xa3/0x310 [ 1663.925024] vfs_kern_mount.part.0+0x68/0x470 [ 1663.929522] ? kfree+0x110/0x210 [ 1663.932886] vfs_kern_mount+0x3c/0x60 [ 1663.936700] btrfs_mount+0x23a/0xaa0 [ 1663.940426] ? btrfs_show_options+0xfd0/0xfd0 [ 1663.944912] ? __mutex_unlock_slowpath+0xea/0x610 [ 1663.949747] ? check_preemption_disabled+0x41/0x280 [ 1663.954811] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1663.959816] ? pcpu_alloc+0xc9/0x1190 [ 1663.963606] ? __lockdep_init_map+0x100/0x5a0 [ 1663.968094] mount_fs+0xa3/0x310 [ 1663.971457] vfs_kern_mount.part.0+0x68/0x470 [ 1663.975946] do_mount+0x115c/0x2f50 [ 1663.979582] ? cmp_ex_sort+0xc0/0xc0 [ 1663.983302] ? __do_page_fault+0x180/0xd60 [ 1663.987527] ? copy_mount_string+0x40/0x40 [ 1663.991756] ? memset+0x20/0x40 [ 1663.995027] ? copy_mount_options+0x26f/0x380 [ 1663.999516] ksys_mount+0xcf/0x130 [ 1664.003049] __x64_sys_mount+0xba/0x150 [ 1664.007017] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1664.011588] do_syscall_64+0xf9/0x620 [ 1664.015405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1664.020594] RIP: 0033:0x7f247ef967aa 04:32:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000400000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000600000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1664.024301] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1664.043191] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1664.050894] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1664.058178] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1664.065438] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1664.072694] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1664.079974] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 [ 1664.175521] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by systemd-udevd (30587) 04:32:27 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf6030000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:27 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000700000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000004000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 50) 04:32:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500200000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000001000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1664.631501] FAULT_INJECTION: forcing a failure. [ 1664.631501] name failslab, interval 1, probability 0, space 0, times 0 [ 1664.645190] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (30624) 04:32:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000fffffff600000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000fffffdfc00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1664.685202] CPU: 0 PID: 30620 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1664.693132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1664.702523] Call Trace: [ 1664.705125] dump_stack+0x1fc/0x2ef [ 1664.708769] should_fail.cold+0xa/0xf [ 1664.712580] ? setup_fault_attr+0x200/0x200 [ 1664.716914] ? lock_acquire+0x170/0x3c0 [ 1664.720900] __should_failslab+0x115/0x180 [ 1664.725146] should_failslab+0x5/0x10 [ 1664.728957] kmem_cache_alloc_trace+0x284/0x380 04:32:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000fffffffe00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1664.733638] btrfs_mount_root+0x1e1/0x1830 [ 1664.737973] ? btrfs_decode_error+0x70/0x70 [ 1664.742304] ? __mutex_unlock_slowpath+0xea/0x610 [ 1664.747154] ? check_preemption_disabled+0x41/0x280 [ 1664.752187] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1664.757210] ? pcpu_alloc+0xc9/0x1190 [ 1664.761021] ? __lockdep_init_map+0x100/0x5a0 [ 1664.765528] mount_fs+0xa3/0x310 [ 1664.768911] vfs_kern_mount.part.0+0x68/0x470 [ 1664.773439] ? kfree+0x110/0x210 [ 1664.776810] vfs_kern_mount+0x3c/0x60 [ 1664.780615] btrfs_mount+0x23a/0xaa0 04:32:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000fcfdffff00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1664.784336] ? btrfs_show_options+0xfd0/0xfd0 [ 1664.788835] ? __mutex_unlock_slowpath+0xea/0x610 [ 1664.793688] ? check_preemption_disabled+0x41/0x280 [ 1664.798717] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1664.803738] ? pcpu_alloc+0xc9/0x1190 [ 1664.807547] ? __lockdep_init_map+0x100/0x5a0 [ 1664.812049] mount_fs+0xa3/0x310 [ 1664.815448] vfs_kern_mount.part.0+0x68/0x470 [ 1664.819958] do_mount+0x115c/0x2f50 [ 1664.823615] ? cmp_ex_sort+0xc0/0xc0 [ 1664.827337] ? __do_page_fault+0x180/0xd60 [ 1664.831578] ? copy_mount_string+0x40/0x40 [ 1664.835859] ? memset+0x20/0x40 [ 1664.839147] ? copy_mount_options+0x26f/0x380 [ 1664.843648] ksys_mount+0xcf/0x130 [ 1664.847195] __x64_sys_mount+0xba/0x150 [ 1664.851182] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1664.855774] do_syscall_64+0xf9/0x620 [ 1664.859588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1664.864779] RIP: 0033:0x7f247ef967aa 04:32:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000f6ffffff00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1664.868492] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1664.887397] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1664.895111] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1664.902382] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1664.909652] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1664.916921] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1664.924192] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:28 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf6ffffff, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000feffffff00000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:28 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500230000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 51) 04:32:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000020000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000006000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1665.560582] FAULT_INJECTION: forcing a failure. [ 1665.560582] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1665.572842] CPU: 0 PID: 30663 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1665.580733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1665.590115] Call Trace: [ 1665.592717] dump_stack+0x1fc/0x2ef [ 1665.596354] should_fail.cold+0xa/0xf [ 1665.600192] ? setup_fault_attr+0x200/0x200 [ 1665.604530] __alloc_pages_nodemask+0x239/0x2890 04:32:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000100000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000007000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1665.609293] ? __save_stack_trace+0x72/0x190 [ 1665.613738] ? deref_stack_reg+0x134/0x1d0 [ 1665.617980] ? mark_held_locks+0xf0/0xf0 [ 1665.622052] ? unwind_next_frame+0xeee/0x1400 [ 1665.626556] ? __lock_acquire+0x6de/0x3ff0 [ 1665.630821] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1665.635671] ? is_bpf_text_address+0xd5/0x1b0 [ 1665.640209] ? __bpf_address_lookup+0x330/0x330 [ 1665.644883] ? check_preemption_disabled+0x41/0x280 [ 1665.649911] ? is_bpf_text_address+0xfc/0x1b0 [ 1665.654412] ? kernel_text_address+0xbd/0xf0 04:32:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000002000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000020000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1665.658825] cache_grow_begin+0xa4/0x8a0 [ 1665.662896] ? setup_fault_attr+0x200/0x200 [ 1665.667226] ? lock_acquire+0x170/0x3c0 [ 1665.671208] cache_alloc_refill+0x273/0x340 [ 1665.675542] kmem_cache_alloc+0x346/0x370 [ 1665.679709] getname_kernel+0x4e/0x370 [ 1665.683601] kern_path+0x1b/0x40 [ 1665.686979] lookup_bdev+0xfc/0x220 [ 1665.690609] ? bd_acquire+0x440/0x440 [ 1665.694413] ? debug_check_no_obj_freed+0x201/0x490 [ 1665.699436] blkdev_get_by_path+0x1b/0xd0 [ 1665.703588] btrfs_scan_one_device+0xd0/0xd00 [ 1665.708177] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1665.713297] ? debug_check_no_obj_freed+0x201/0x490 [ 1665.718351] ? device_list_add+0xdd0/0xdd0 [ 1665.722593] ? kfree+0x110/0x210 [ 1665.725973] ? btrfs_mount_root+0x107a/0x1830 [ 1665.730476] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1665.735072] btrfs_mount_root+0x9df/0x1830 [ 1665.739327] ? btrfs_decode_error+0x70/0x70 [ 1665.743652] ? __mutex_unlock_slowpath+0xea/0x610 [ 1665.748508] ? check_preemption_disabled+0x41/0x280 [ 1665.753535] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1665.758553] ? pcpu_alloc+0xc9/0x1190 [ 1665.762365] ? __lockdep_init_map+0x100/0x5a0 [ 1665.766868] mount_fs+0xa3/0x310 [ 1665.770248] vfs_kern_mount.part.0+0x68/0x470 [ 1665.774752] ? kfree+0x110/0x210 [ 1665.778125] vfs_kern_mount+0x3c/0x60 [ 1665.781931] btrfs_mount+0x23a/0xaa0 [ 1665.785650] ? btrfs_show_options+0xfd0/0xfd0 [ 1665.790148] ? __mutex_unlock_slowpath+0xea/0x610 [ 1665.794996] ? check_preemption_disabled+0x41/0x280 [ 1665.800057] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1665.805075] ? pcpu_alloc+0xc9/0x1190 [ 1665.808882] ? __lockdep_init_map+0x100/0x5a0 [ 1665.813384] mount_fs+0xa3/0x310 [ 1665.816759] vfs_kern_mount.part.0+0x68/0x470 [ 1665.821269] do_mount+0x115c/0x2f50 [ 1665.824903] ? cmp_ex_sort+0xc0/0xc0 [ 1665.828622] ? __do_page_fault+0x180/0xd60 [ 1665.832976] ? copy_mount_string+0x40/0x40 [ 1665.837222] ? memset+0x20/0x40 [ 1665.840512] ? copy_mount_options+0x26f/0x380 [ 1665.845014] ksys_mount+0xcf/0x130 [ 1665.848562] __x64_sys_mount+0xba/0x150 [ 1665.852542] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1665.857129] do_syscall_64+0xf9/0x620 [ 1665.860940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1665.866128] RIP: 0033:0x7f247ef967aa [ 1665.869844] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1665.888748] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1665.896461] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1665.903732] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1665.911008] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1665.918282] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1665.925553] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xf9010000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000001000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000003f000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:29 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 52) 04:32:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85003f0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000002000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1666.473114] FAULT_INJECTION: forcing a failure. [ 1666.473114] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.497700] CPU: 1 PID: 30702 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1666.506125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1666.515480] Call Trace: [ 1666.518079] dump_stack+0x1fc/0x2ef [ 1666.521837] should_fail.cold+0xa/0xf [ 1666.525648] ? setup_fault_attr+0x200/0x200 [ 1666.529982] ? lock_acquire+0x170/0x3c0 [ 1666.533977] __should_failslab+0x115/0x180 [ 1666.538220] should_failslab+0x5/0x10 [ 1666.542023] __kmalloc_track_caller+0x2a6/0x3c0 [ 1666.546695] ? btrfs_mount_root+0x364/0x1830 [ 1666.551119] kstrdup+0x36/0x70 [ 1666.554321] btrfs_mount_root+0x364/0x1830 [ 1666.558571] ? btrfs_decode_error+0x70/0x70 [ 1666.562897] ? __mutex_unlock_slowpath+0xea/0x610 [ 1666.567752] ? check_preemption_disabled+0x41/0x280 [ 1666.572781] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1666.577805] ? pcpu_alloc+0xc9/0x1190 [ 1666.581610] ? __lockdep_init_map+0x100/0x5a0 [ 1666.586114] mount_fs+0xa3/0x310 [ 1666.589510] vfs_kern_mount.part.0+0x68/0x470 [ 1666.594011] ? kfree+0x110/0x210 [ 1666.597384] vfs_kern_mount+0x3c/0x60 [ 1666.601191] btrfs_mount+0x23a/0xaa0 [ 1666.604912] ? btrfs_show_options+0xfd0/0xfd0 [ 1666.609412] ? __mutex_unlock_slowpath+0xea/0x610 [ 1666.614265] ? check_preemption_disabled+0x41/0x280 [ 1666.619293] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1666.624311] ? pcpu_alloc+0xc9/0x1190 [ 1666.628123] ? __lockdep_init_map+0x100/0x5a0 [ 1666.632626] mount_fs+0xa3/0x310 [ 1666.636087] vfs_kern_mount.part.0+0x68/0x470 [ 1666.640594] do_mount+0x115c/0x2f50 [ 1666.644231] ? cmp_ex_sort+0xc0/0xc0 [ 1666.647965] ? __do_page_fault+0x180/0xd60 [ 1666.652210] ? copy_mount_string+0x40/0x40 [ 1666.656476] ? memset+0x20/0x40 [ 1666.659765] ? copy_mount_options+0x26f/0x380 [ 1666.664274] ksys_mount+0xcf/0x130 [ 1666.667824] __x64_sys_mount+0xba/0x150 [ 1666.671811] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1666.676413] do_syscall_64+0xf9/0x620 [ 1666.680224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1666.685440] RIP: 0033:0x7f247ef967aa [ 1666.689157] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1666.708057] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1666.715770] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa 04:32:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000003000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000040000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1666.723043] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1666.730318] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1666.737588] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1666.744852] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000004000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fdef000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:29 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1666.854122] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (30705) [ 1666.888174] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by systemd-udevd (30700) 04:32:30 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xfabf914d, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 53) 04:32:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000006000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000effd000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500400000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:30 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000010000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1667.578387] FAULT_INJECTION: forcing a failure. [ 1667.578387] name failslab, interval 1, probability 0, space 0, times 0 [ 1667.651698] CPU: 0 PID: 30742 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1667.659603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1667.668955] Call Trace: [ 1667.671555] dump_stack+0x1fc/0x2ef [ 1667.675190] should_fail.cold+0xa/0xf [ 1667.679000] ? setup_fault_attr+0x200/0x200 [ 1667.683331] ? lock_acquire+0x170/0x3c0 [ 1667.687317] __should_failslab+0x115/0x180 [ 1667.691563] should_failslab+0x5/0x10 [ 1667.695370] __kmalloc_track_caller+0x2a6/0x3c0 [ 1667.700048] ? btrfs_mount_root+0x364/0x1830 [ 1667.704468] kstrdup+0x36/0x70 [ 1667.707669] btrfs_mount_root+0x364/0x1830 [ 1667.711915] ? btrfs_decode_error+0x70/0x70 [ 1667.716243] ? __mutex_unlock_slowpath+0xea/0x610 [ 1667.721093] ? check_preemption_disabled+0x41/0x280 [ 1667.726118] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1667.731135] ? pcpu_alloc+0xc9/0x1190 [ 1667.734941] ? __lockdep_init_map+0x100/0x5a0 [ 1667.739442] mount_fs+0xa3/0x310 [ 1667.742820] vfs_kern_mount.part.0+0x68/0x470 [ 1667.747317] ? kfree+0x110/0x210 [ 1667.750690] vfs_kern_mount+0x3c/0x60 [ 1667.754519] btrfs_mount+0x23a/0xaa0 [ 1667.758243] ? btrfs_show_options+0xfd0/0xfd0 [ 1667.762750] ? __mutex_unlock_slowpath+0xea/0x610 [ 1667.767603] ? check_preemption_disabled+0x41/0x280 [ 1667.772635] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1667.777655] ? pcpu_alloc+0xc9/0x1190 [ 1667.781458] ? __lockdep_init_map+0x100/0x5a0 [ 1667.785961] mount_fs+0xa3/0x310 [ 1667.789340] vfs_kern_mount.part.0+0x68/0x470 [ 1667.793845] do_mount+0x115c/0x2f50 [ 1667.797495] ? cmp_ex_sort+0xc0/0xc0 04:32:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000020000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1667.801217] ? __do_page_fault+0x180/0xd60 [ 1667.805457] ? copy_mount_string+0x40/0x40 [ 1667.809704] ? memset+0x20/0x40 [ 1667.812989] ? copy_mount_options+0x26f/0x380 [ 1667.817489] ksys_mount+0xcf/0x130 [ 1667.821039] __x64_sys_mount+0xba/0x150 [ 1667.825022] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1667.829607] do_syscall_64+0xf9/0x620 [ 1667.833413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1667.838603] RIP: 0033:0x7f247ef967aa [ 1667.842317] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1667.861220] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1667.868941] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1667.876211] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1667.883478] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1667.890765] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 04:32:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000000000000000003f000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1667.898034] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000200000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000040000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000100000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1668.106587] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (30756) 04:32:31 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xfcfdffff, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000000000fffffff6000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 54) 04:32:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000200000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:31 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfabf914d, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500480000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000000000fffffdfc000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000000000fffffffe000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000300000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85004c0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000000000ffffffff000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000400000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1668.577275] FAULT_INJECTION: forcing a failure. [ 1668.577275] name failslab, interval 1, probability 0, space 0, times 0 [ 1668.628898] CPU: 0 PID: 30797 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1668.636809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1668.646167] Call Trace: [ 1668.648762] dump_stack+0x1fc/0x2ef [ 1668.652396] should_fail.cold+0xa/0xf [ 1668.656205] ? setup_fault_attr+0x200/0x200 [ 1668.660538] __should_failslab+0x115/0x180 [ 1668.664780] should_failslab+0x5/0x10 [ 1668.668587] __kmalloc+0x2ab/0x3c0 [ 1668.672128] ? device_list_add+0x85d/0xdd0 [ 1668.676374] device_list_add+0x85d/0xdd0 [ 1668.680441] ? btrfs_rm_dev_replace_free_srcdev+0x450/0x450 [ 1668.686163] btrfs_scan_one_device+0x33f/0xd00 [ 1668.690749] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1668.695857] ? debug_check_no_obj_freed+0x201/0x490 [ 1668.700871] ? device_list_add+0xdd0/0xdd0 [ 1668.705105] ? kfree+0x110/0x210 [ 1668.708477] ? btrfs_mount_root+0x107a/0x1830 [ 1668.712979] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1668.717565] btrfs_mount_root+0x9df/0x1830 [ 1668.721894] ? btrfs_decode_error+0x70/0x70 [ 1668.726220] ? __mutex_unlock_slowpath+0xea/0x610 [ 1668.731067] ? check_preemption_disabled+0x41/0x280 [ 1668.736090] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1668.741110] ? pcpu_alloc+0xc9/0x1190 [ 1668.744918] ? __lockdep_init_map+0x100/0x5a0 [ 1668.749423] mount_fs+0xa3/0x310 [ 1668.752797] vfs_kern_mount.part.0+0x68/0x470 [ 1668.757294] ? kfree+0x110/0x210 [ 1668.760666] vfs_kern_mount+0x3c/0x60 [ 1668.764482] btrfs_mount+0x23a/0xaa0 [ 1668.768218] ? btrfs_show_options+0xfd0/0xfd0 [ 1668.772712] ? __mutex_unlock_slowpath+0xea/0x610 [ 1668.777561] ? check_preemption_disabled+0x41/0x280 [ 1668.782585] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1668.787602] ? pcpu_alloc+0xc9/0x1190 [ 1668.791405] ? __lockdep_init_map+0x100/0x5a0 [ 1668.795906] mount_fs+0xa3/0x310 [ 1668.799282] vfs_kern_mount.part.0+0x68/0x470 [ 1668.803788] do_mount+0x115c/0x2f50 [ 1668.807424] ? cmp_ex_sort+0xc0/0xc0 [ 1668.811143] ? __do_page_fault+0x180/0xd60 [ 1668.815383] ? copy_mount_string+0x40/0x40 [ 1668.819642] ? memset+0x20/0x40 [ 1668.822928] ? copy_mount_options+0x26f/0x380 [ 1668.827432] ksys_mount+0xcf/0x130 [ 1668.830991] __x64_sys_mount+0xba/0x150 [ 1668.834972] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1668.839557] do_syscall_64+0xf9/0x620 [ 1668.843365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1668.848563] RIP: 0033:0x7f247ef967aa [ 1668.852282] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1668.871184] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1668.878891] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1668.886164] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1668.893436] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1668.900707] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1668.907974] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 [ 1668.975436] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (30803) 04:32:32 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xfdfdffff, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000002000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000600000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 55) 04:32:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500680000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:32 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:32 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000700000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000003000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1669.318433] FAULT_INJECTION: forcing a failure. [ 1669.318433] name failslab, interval 1, probability 0, space 0, times 0 04:32:32 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1669.390663] CPU: 1 PID: 30830 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1669.398652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1669.408004] Call Trace: [ 1669.410596] dump_stack+0x1fc/0x2ef [ 1669.414231] should_fail.cold+0xa/0xf [ 1669.418037] ? setup_fault_attr+0x200/0x200 [ 1669.422366] __should_failslab+0x115/0x180 [ 1669.426603] should_failslab+0x5/0x10 [ 1669.430404] __kmalloc+0x2ab/0x3c0 [ 1669.433945] ? device_list_add+0x85d/0xdd0 [ 1669.438180] device_list_add+0x85d/0xdd0 [ 1669.442247] ? btrfs_rm_dev_replace_free_srcdev+0x450/0x450 [ 1669.447966] btrfs_scan_one_device+0x33f/0xd00 [ 1669.452558] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1669.457661] ? debug_check_no_obj_freed+0x201/0x490 [ 1669.462683] ? device_list_add+0xdd0/0xdd0 [ 1669.466917] ? kfree+0x110/0x210 [ 1669.470288] ? btrfs_mount_root+0x107a/0x1830 [ 1669.474874] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1669.479462] btrfs_mount_root+0x9df/0x1830 [ 1669.483703] ? btrfs_decode_error+0x70/0x70 [ 1669.488029] ? __mutex_unlock_slowpath+0xea/0x610 [ 1669.492883] ? check_preemption_disabled+0x41/0x280 [ 1669.497911] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1669.502930] ? pcpu_alloc+0xc9/0x1190 [ 1669.506733] ? __lockdep_init_map+0x100/0x5a0 [ 1669.511233] mount_fs+0xa3/0x310 [ 1669.514604] vfs_kern_mount.part.0+0x68/0x470 [ 1669.519100] ? kfree+0x110/0x210 [ 1669.522472] vfs_kern_mount+0x3c/0x60 [ 1669.526278] btrfs_mount+0x23a/0xaa0 [ 1669.529995] ? btrfs_show_options+0xfd0/0xfd0 [ 1669.534488] ? __mutex_unlock_slowpath+0xea/0x610 [ 1669.539339] ? check_preemption_disabled+0x41/0x280 [ 1669.544363] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1669.549379] ? pcpu_alloc+0xc9/0x1190 [ 1669.553187] ? __lockdep_init_map+0x100/0x5a0 [ 1669.557684] mount_fs+0xa3/0x310 [ 1669.561058] vfs_kern_mount.part.0+0x68/0x470 [ 1669.565558] do_mount+0x115c/0x2f50 [ 1669.569188] ? cmp_ex_sort+0xc0/0xc0 [ 1669.572905] ? __do_page_fault+0x180/0xd60 [ 1669.577142] ? copy_mount_string+0x40/0x40 [ 1669.581385] ? memset+0x20/0x40 [ 1669.584663] ? copy_mount_options+0x26f/0x380 [ 1669.589162] ksys_mount+0xcf/0x130 [ 1669.592703] __x64_sys_mount+0xba/0x150 [ 1669.596679] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1669.601259] do_syscall_64+0xf9/0x620 [ 1669.605064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1669.610251] RIP: 0033:0x7f247ef967aa [ 1669.613962] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1669.632855] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 04:32:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000001000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000004000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1669.640562] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1669.647848] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1669.655114] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1669.662382] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1669.669645] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 [ 1669.768287] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by systemd-udevd (30829) [ 1669.822285] ieee802154 phy0 wpan0: encryption failed: -22 [ 1669.827875] ieee802154 phy1 wpan1: encryption failed: -22 04:32:33 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xfdffffff, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000003f00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:33 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000006000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 56) 04:32:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85006c0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000004000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000010000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:33 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffdef00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1670.301158] FAULT_INJECTION: forcing a failure. [ 1670.301158] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1670.312977] CPU: 0 PID: 30872 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1670.320857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1670.330207] Call Trace: [ 1670.332801] dump_stack+0x1fc/0x2ef [ 1670.336438] should_fail.cold+0xa/0xf [ 1670.340685] ? setup_fault_attr+0x200/0x200 [ 1670.345026] __alloc_pages_nodemask+0x239/0x2890 [ 1670.349786] ? mark_held_locks+0xf0/0xf0 [ 1670.353860] ? __lock_acquire+0x6de/0x3ff0 [ 1670.358111] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1670.362970] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 1670.368116] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1670.372700] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1670.377807] ? try_to_wake_up+0x733/0x1050 [ 1670.382049] ? __mutex_unlock_slowpath+0x2b4/0x610 [ 1670.386986] cache_grow_begin+0xa4/0x8a0 [ 1670.391052] ? setup_fault_attr+0x200/0x200 [ 1670.395376] ? lock_acquire+0x170/0x3c0 [ 1670.399354] cache_alloc_refill+0x273/0x340 [ 1670.403688] kmem_cache_alloc+0x346/0x370 [ 1670.407840] getname_kernel+0x4e/0x370 [ 1670.411725] kern_path+0x1b/0x40 [ 1670.415088] lookup_bdev+0xfc/0x220 [ 1670.418714] ? bd_acquire+0x440/0x440 [ 1670.422536] ? list_sort.part.0+0x523/0x790 [ 1670.426859] ? try_release_extent_buffer+0x3a0/0x3a0 [ 1670.431970] blkdev_get_by_path+0x1b/0xd0 [ 1670.436131] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1670.440628] open_fs_devices+0x5a3/0xa50 [ 1670.444695] ? find_fsid+0xb0/0xb0 [ 1670.448234] ? debug_check_no_obj_freed+0x201/0x490 [ 1670.453273] btrfs_open_devices+0x114/0x150 [ 1670.457598] btrfs_mount_root+0xa60/0x1830 [ 1670.461843] ? btrfs_decode_error+0x70/0x70 [ 1670.466166] ? __mutex_unlock_slowpath+0xea/0x610 [ 1670.471018] ? check_preemption_disabled+0x41/0x280 [ 1670.476043] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1670.481062] ? pcpu_alloc+0xc9/0x1190 [ 1670.484869] ? __lockdep_init_map+0x100/0x5a0 [ 1670.489372] mount_fs+0xa3/0x310 [ 1670.492747] vfs_kern_mount.part.0+0x68/0x470 [ 1670.497245] ? kfree+0x110/0x210 [ 1670.500623] vfs_kern_mount+0x3c/0x60 [ 1670.504430] btrfs_mount+0x23a/0xaa0 [ 1670.508154] ? btrfs_show_options+0xfd0/0xfd0 [ 1670.512649] ? __mutex_unlock_slowpath+0xea/0x610 [ 1670.517506] ? check_preemption_disabled+0x41/0x280 [ 1670.522533] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1670.527554] ? pcpu_alloc+0xc9/0x1190 [ 1670.531360] ? __lockdep_init_map+0x100/0x5a0 [ 1670.535863] mount_fs+0xa3/0x310 [ 1670.539248] vfs_kern_mount.part.0+0x68/0x470 [ 1670.543748] do_mount+0x115c/0x2f50 [ 1670.547377] ? cmp_ex_sort+0xc0/0xc0 [ 1670.551100] ? __do_page_fault+0x180/0xd60 [ 1670.555350] ? copy_mount_string+0x40/0x40 [ 1670.559595] ? memset+0x20/0x40 [ 1670.562882] ? copy_mount_options+0x26f/0x380 [ 1670.567391] ksys_mount+0xcf/0x130 [ 1670.570933] __x64_sys_mount+0xba/0x150 [ 1670.574916] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1670.579498] do_syscall_64+0xf9/0x620 [ 1670.583306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.588491] RIP: 0033:0x7f247ef967aa [ 1670.592207] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1670.611109] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1670.618821] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1670.626086] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1670.633886] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1670.641150] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 04:32:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500740000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000030000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1670.648415] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 [ 1670.712160] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (30886) [ 1670.733797] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by systemd-udevd (30871) [ 1670.762754] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (30897) 04:32:34 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xff0f0000, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffff600000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000060000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:34 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85007a0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 57) 04:32:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffdfc00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000200000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffffe00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1671.114612] FAULT_INJECTION: forcing a failure. [ 1671.114612] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1671.126439] CPU: 1 PID: 30920 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1671.134320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1671.143673] Call Trace: [ 1671.146268] dump_stack+0x1fc/0x2ef [ 1671.149910] should_fail.cold+0xa/0xf [ 1671.153721] ? setup_fault_attr+0x200/0x200 [ 1671.158063] __alloc_pages_nodemask+0x239/0x2890 [ 1671.162820] ? __save_stack_trace+0x72/0x190 [ 1671.167228] ? deref_stack_reg+0x134/0x1d0 [ 1671.171463] ? mark_held_locks+0xf0/0xf0 [ 1671.175531] ? unwind_next_frame+0xeee/0x1400 [ 1671.180030] ? __lock_acquire+0x6de/0x3ff0 [ 1671.184277] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1671.189120] ? is_bpf_text_address+0xd5/0x1b0 [ 1671.193623] ? __bpf_address_lookup+0x330/0x330 [ 1671.198300] ? check_preemption_disabled+0x41/0x280 [ 1671.203324] ? is_bpf_text_address+0xfc/0x1b0 [ 1671.207821] ? kernel_text_address+0xbd/0xf0 [ 1671.212235] cache_grow_begin+0xa4/0x8a0 [ 1671.216299] ? setup_fault_attr+0x200/0x200 [ 1671.220622] ? lock_acquire+0x170/0x3c0 [ 1671.224602] cache_alloc_refill+0x273/0x340 [ 1671.228932] kmem_cache_alloc+0x346/0x370 [ 1671.233088] getname_kernel+0x4e/0x370 [ 1671.236973] kern_path+0x1b/0x40 [ 1671.240343] lookup_bdev+0xfc/0x220 [ 1671.243970] ? bd_acquire+0x440/0x440 [ 1671.247771] ? debug_check_no_obj_freed+0x201/0x490 [ 1671.252791] blkdev_get_by_path+0x1b/0xd0 [ 1671.256941] btrfs_scan_one_device+0xd0/0xd00 [ 1671.261441] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1671.266545] ? debug_check_no_obj_freed+0x201/0x490 [ 1671.271562] ? device_list_add+0xdd0/0xdd0 [ 1671.275792] ? kfree+0x110/0x210 [ 1671.279178] ? btrfs_mount_root+0x107a/0x1830 [ 1671.283677] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1671.288265] btrfs_mount_root+0x9df/0x1830 [ 1671.292512] ? btrfs_decode_error+0x70/0x70 [ 1671.296834] ? __mutex_unlock_slowpath+0xea/0x610 [ 1671.301681] ? check_preemption_disabled+0x41/0x280 [ 1671.306705] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1671.311717] ? pcpu_alloc+0xc9/0x1190 [ 1671.315521] ? __lockdep_init_map+0x100/0x5a0 [ 1671.320021] mount_fs+0xa3/0x310 [ 1671.323392] vfs_kern_mount.part.0+0x68/0x470 [ 1671.327884] ? kfree+0x110/0x210 [ 1671.331254] vfs_kern_mount+0x3c/0x60 [ 1671.335061] btrfs_mount+0x23a/0xaa0 [ 1671.338783] ? btrfs_show_options+0xfd0/0xfd0 [ 1671.343282] ? __mutex_unlock_slowpath+0xea/0x610 [ 1671.348131] ? check_preemption_disabled+0x41/0x280 [ 1671.353163] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1671.358180] ? pcpu_alloc+0xc9/0x1190 [ 1671.361984] ? __lockdep_init_map+0x100/0x5a0 [ 1671.366482] mount_fs+0xa3/0x310 [ 1671.369857] vfs_kern_mount.part.0+0x68/0x470 [ 1671.374356] do_mount+0x115c/0x2f50 [ 1671.377988] ? cmp_ex_sort+0xc0/0xc0 [ 1671.381706] ? __do_page_fault+0x180/0xd60 [ 1671.385941] ? copy_mount_string+0x40/0x40 [ 1671.390183] ? memset+0x20/0x40 [ 1671.393461] ? copy_mount_options+0x26f/0x380 [ 1671.397960] ksys_mount+0xcf/0x130 [ 1671.401501] __x64_sys_mount+0xba/0x150 [ 1671.405487] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1671.410068] do_syscall_64+0xf9/0x620 [ 1671.413874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.419062] RIP: 0033:0x7f247ef967aa [ 1671.422776] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1671.441681] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1671.449396] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1671.456664] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 04:32:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000effdffff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fcfdffff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000f6ffffff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1671.463928] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1671.471195] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1671.478460] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:34 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xffff1f00, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000feffffff00000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000003f0000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:34 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85c0ed0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 58) 04:32:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000400000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850fff0000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000020000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1671.980364] FAULT_INJECTION: forcing a failure. [ 1671.980364] name failslab, interval 1, probability 0, space 0, times 0 [ 1672.017085] CPU: 0 PID: 30965 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1672.024992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1672.034346] Call Trace: [ 1672.036940] dump_stack+0x1fc/0x2ef [ 1672.040584] should_fail.cold+0xa/0xf [ 1672.044394] ? setup_fault_attr+0x200/0x200 [ 1672.048718] ? lock_acquire+0x170/0x3c0 [ 1672.052703] __should_failslab+0x115/0x180 [ 1672.056946] should_failslab+0x5/0x10 [ 1672.060750] kmem_cache_alloc+0x277/0x370 [ 1672.064907] getname_kernel+0x4e/0x370 [ 1672.068796] kern_path+0x1b/0x40 [ 1672.072196] lookup_bdev+0xfc/0x220 [ 1672.075830] ? bd_acquire+0x440/0x440 [ 1672.079640] ? list_sort.part.0+0x523/0x790 [ 1672.083965] ? try_release_extent_buffer+0x3a0/0x3a0 [ 1672.089075] blkdev_get_by_path+0x1b/0xd0 [ 1672.093226] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1672.097732] open_fs_devices+0x5a3/0xa50 [ 1672.101801] ? find_fsid+0xb0/0xb0 [ 1672.105342] ? debug_check_no_obj_freed+0x201/0x490 [ 1672.110368] btrfs_open_devices+0x114/0x150 [ 1672.114694] btrfs_mount_root+0xa60/0x1830 [ 1672.118941] ? btrfs_decode_error+0x70/0x70 [ 1672.123263] ? __mutex_unlock_slowpath+0xea/0x610 [ 1672.128115] ? check_preemption_disabled+0x41/0x280 [ 1672.133147] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1672.138178] ? pcpu_alloc+0xc9/0x1190 [ 1672.141991] ? __lockdep_init_map+0x100/0x5a0 [ 1672.146489] mount_fs+0xa3/0x310 [ 1672.149860] vfs_kern_mount.part.0+0x68/0x470 [ 1672.154355] ? kfree+0x110/0x210 [ 1672.157725] vfs_kern_mount+0x3c/0x60 [ 1672.161532] btrfs_mount+0x23a/0xaa0 [ 1672.165253] ? btrfs_show_options+0xfd0/0xfd0 [ 1672.169744] ? __mutex_unlock_slowpath+0xea/0x610 [ 1672.174590] ? check_preemption_disabled+0x41/0x280 [ 1672.179627] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1672.184644] ? pcpu_alloc+0xc9/0x1190 [ 1672.188445] ? __lockdep_init_map+0x100/0x5a0 [ 1672.192945] mount_fs+0xa3/0x310 [ 1672.196321] vfs_kern_mount.part.0+0x68/0x470 [ 1672.200823] do_mount+0x115c/0x2f50 [ 1672.204455] ? cmp_ex_sort+0xc0/0xc0 [ 1672.208174] ? __do_page_fault+0x180/0xd60 [ 1672.212409] ? copy_mount_string+0x40/0x40 [ 1672.216653] ? memset+0x20/0x40 [ 1672.219932] ? copy_mount_options+0x26f/0x380 [ 1672.224431] ksys_mount+0xcf/0x130 [ 1672.227975] __x64_sys_mount+0xba/0x150 [ 1672.231951] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1672.236535] do_syscall_64+0xf9/0x620 [ 1672.240344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1672.245531] RIP: 0033:0x7f247ef967aa [ 1672.249244] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1672.268143] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 04:32:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000200000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000f0ffffff7f0000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1672.275850] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1672.283123] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1672.290394] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1672.297659] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1672.304924] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000100000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:35 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xfffffdfc, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000002000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000002000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:35 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 59) 04:32:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500100100000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000007ffffffff000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000001000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1672.831655] FAULT_INJECTION: forcing a failure. [ 1672.831655] name failslab, interval 1, probability 0, space 0, times 0 [ 1672.881606] CPU: 0 PID: 30999 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1672.889515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1672.898870] Call Trace: [ 1672.901465] dump_stack+0x1fc/0x2ef [ 1672.905099] should_fail.cold+0xa/0xf [ 1672.908907] ? setup_fault_attr+0x200/0x200 [ 1672.913230] ? lock_acquire+0x170/0x3c0 [ 1672.917216] __should_failslab+0x115/0x180 [ 1672.921454] should_failslab+0x5/0x10 [ 1672.925251] kmem_cache_alloc+0x277/0x370 [ 1672.929405] getname_kernel+0x4e/0x370 [ 1672.933291] kern_path+0x1b/0x40 [ 1672.936658] lookup_bdev+0xfc/0x220 [ 1672.940286] ? bd_acquire+0x440/0x440 [ 1672.944094] ? list_sort.part.0+0x523/0x790 [ 1672.948415] ? try_release_extent_buffer+0x3a0/0x3a0 [ 1672.953525] blkdev_get_by_path+0x1b/0xd0 [ 1672.957675] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1672.962170] open_fs_devices+0x5a3/0xa50 [ 1672.966235] ? find_fsid+0xb0/0xb0 [ 1672.969778] ? debug_check_no_obj_freed+0x201/0x490 [ 1672.974804] btrfs_open_devices+0x114/0x150 [ 1672.979134] btrfs_mount_root+0xa60/0x1830 [ 1672.983378] ? btrfs_decode_error+0x70/0x70 [ 1672.987704] ? __mutex_unlock_slowpath+0xea/0x610 [ 1672.992552] ? check_preemption_disabled+0x41/0x280 [ 1672.997575] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1673.002590] ? pcpu_alloc+0xc9/0x1190 [ 1673.006390] ? __lockdep_init_map+0x100/0x5a0 [ 1673.010890] mount_fs+0xa3/0x310 [ 1673.014260] vfs_kern_mount.part.0+0x68/0x470 [ 1673.018755] ? kfree+0x110/0x210 [ 1673.022124] vfs_kern_mount+0x3c/0x60 [ 1673.025926] btrfs_mount+0x23a/0xaa0 [ 1673.029641] ? btrfs_show_options+0xfd0/0xfd0 [ 1673.034135] ? __mutex_unlock_slowpath+0xea/0x610 [ 1673.038986] ? check_preemption_disabled+0x41/0x280 [ 1673.044026] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1673.049046] ? pcpu_alloc+0xc9/0x1190 [ 1673.052849] ? __lockdep_init_map+0x100/0x5a0 [ 1673.057348] mount_fs+0xa3/0x310 [ 1673.060720] vfs_kern_mount.part.0+0x68/0x470 [ 1673.065217] do_mount+0x115c/0x2f50 [ 1673.068848] ? cmp_ex_sort+0xc0/0xc0 [ 1673.072571] ? __do_page_fault+0x180/0xd60 [ 1673.076812] ? copy_mount_string+0x40/0x40 [ 1673.081061] ? memset+0x20/0x40 [ 1673.084341] ? copy_mount_options+0x26f/0x380 [ 1673.088839] ksys_mount+0xcf/0x130 [ 1673.092382] __x64_sys_mount+0xba/0x150 [ 1673.096359] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1673.100949] do_syscall_64+0xf9/0x620 [ 1673.104766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1673.110065] RIP: 0033:0x7f247ef967aa [ 1673.113781] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:32:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000001000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1673.132682] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1673.140395] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1673.147665] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1673.154932] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1673.162201] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1673.169467] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000002000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 60) 04:32:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000200000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1673.408044] FAULT_INJECTION: forcing a failure. [ 1673.408044] name failslab, interval 1, probability 0, space 0, times 0 [ 1673.438292] CPU: 0 PID: 31028 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1673.446201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1673.455554] Call Trace: [ 1673.458152] dump_stack+0x1fc/0x2ef [ 1673.461792] should_fail.cold+0xa/0xf [ 1673.465600] ? setup_fault_attr+0x200/0x200 [ 1673.469925] ? lock_acquire+0x170/0x3c0 [ 1673.473923] __should_failslab+0x115/0x180 [ 1673.478164] should_failslab+0x5/0x10 [ 1673.481968] kmem_cache_alloc+0x277/0x370 [ 1673.486128] getname_kernel+0x4e/0x370 [ 1673.490017] kern_path+0x1b/0x40 [ 1673.493388] lookup_bdev+0xfc/0x220 [ 1673.497019] ? bd_acquire+0x440/0x440 [ 1673.500827] blkdev_get_by_path+0x1b/0xd0 [ 1673.504985] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1673.509481] open_fs_devices+0x5a3/0xa50 [ 1673.513551] ? find_fsid+0xb0/0xb0 [ 1673.517111] btrfs_open_devices+0x114/0x150 [ 1673.521436] btrfs_mount_root+0xa60/0x1830 [ 1673.525683] ? btrfs_decode_error+0x70/0x70 [ 1673.530007] ? __mutex_unlock_slowpath+0xea/0x610 [ 1673.534864] ? check_preemption_disabled+0x41/0x280 [ 1673.539888] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1673.544905] ? pcpu_alloc+0xc9/0x1190 [ 1673.548711] ? __lockdep_init_map+0x100/0x5a0 [ 1673.553212] mount_fs+0xa3/0x310 [ 1673.556587] vfs_kern_mount.part.0+0x68/0x470 [ 1673.561081] ? kfree+0x110/0x210 [ 1673.564452] vfs_kern_mount+0x3c/0x60 [ 1673.568259] btrfs_mount+0x23a/0xaa0 [ 1673.571981] ? btrfs_show_options+0xfd0/0xfd0 [ 1673.576474] ? __mutex_unlock_slowpath+0xea/0x610 [ 1673.581327] ? check_preemption_disabled+0x41/0x280 [ 1673.586351] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1673.591370] ? pcpu_alloc+0xc9/0x1190 [ 1673.595177] ? __lockdep_init_map+0x100/0x5a0 [ 1673.599678] mount_fs+0xa3/0x310 [ 1673.603052] vfs_kern_mount.part.0+0x68/0x470 [ 1673.607555] do_mount+0x115c/0x2f50 [ 1673.611184] ? cmp_ex_sort+0xc0/0xc0 [ 1673.614899] ? __do_page_fault+0x180/0xd60 [ 1673.619143] ? copy_mount_string+0x40/0x40 [ 1673.623386] ? memset+0x20/0x40 [ 1673.626666] ? copy_mount_options+0x26f/0x380 [ 1673.631167] ksys_mount+0xcf/0x130 [ 1673.634713] __x64_sys_mount+0xba/0x150 [ 1673.638686] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1673.643301] do_syscall_64+0xf9/0x620 [ 1673.647110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1673.652296] RIP: 0033:0x7f247ef967aa 04:32:36 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xfffffdfd, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000002000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:36 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000003000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000400000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1673.656020] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1673.674925] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1673.684462] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1673.691732] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1673.699001] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 04:32:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000003000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1673.706272] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1673.713538] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000004000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000004000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000006000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000006000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1673.820094] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (31041) [ 1673.852621] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (31045) 04:32:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 61) 04:32:37 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1674.066350] FAULT_INJECTION: forcing a failure. [ 1674.066350] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.078230] CPU: 1 PID: 31070 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1674.086126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1674.095575] Call Trace: [ 1674.098172] dump_stack+0x1fc/0x2ef [ 1674.101813] should_fail.cold+0xa/0xf [ 1674.105621] ? setup_fault_attr+0x200/0x200 [ 1674.109949] ? __lock_acquire+0x6de/0x3ff0 [ 1674.114193] __should_failslab+0x115/0x180 [ 1674.118431] should_failslab+0x5/0x10 [ 1674.122232] kmem_cache_alloc+0x3f/0x370 [ 1674.126297] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1674.131930] __radix_tree_create+0x314/0x540 [ 1674.136353] page_cache_tree_insert+0xac/0x3f0 [ 1674.140943] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1674.146396] ? lock_acquire+0x170/0x3c0 [ 1674.150373] ? __add_to_page_cache_locked+0x45e/0xb60 [ 1674.155574] __add_to_page_cache_locked+0x46e/0xb60 [ 1674.160601] ? page_cache_tree_insert+0x3f0/0x3f0 [ 1674.165454] add_to_page_cache_lru+0x16a/0x680 [ 1674.170049] ? add_to_page_cache_locked+0x40/0x40 [ 1674.174910] pagecache_get_page+0x478/0xd50 [ 1674.179243] __getblk_slow+0x216/0x9e0 [ 1674.183149] __bread_gfp+0x218/0x300 [ 1674.186869] btrfs_read_dev_super+0x8a/0x230 [ 1674.191284] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1674.195779] open_fs_devices+0x5a3/0xa50 [ 1674.199851] ? find_fsid+0xb0/0xb0 [ 1674.203408] btrfs_open_devices+0x114/0x150 [ 1674.207740] btrfs_mount_root+0xa60/0x1830 [ 1674.211988] ? btrfs_decode_error+0x70/0x70 [ 1674.216310] ? __mutex_unlock_slowpath+0xea/0x610 [ 1674.221162] ? check_preemption_disabled+0x41/0x280 [ 1674.226188] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1674.231231] ? pcpu_alloc+0xc9/0x1190 [ 1674.235043] ? __lockdep_init_map+0x100/0x5a0 [ 1674.239543] mount_fs+0xa3/0x310 [ 1674.242917] vfs_kern_mount.part.0+0x68/0x470 [ 1674.247414] ? kfree+0x110/0x210 [ 1674.250782] vfs_kern_mount+0x3c/0x60 [ 1674.254593] btrfs_mount+0x23a/0xaa0 [ 1674.258313] ? btrfs_show_options+0xfd0/0xfd0 [ 1674.262806] ? __mutex_unlock_slowpath+0xea/0x610 [ 1674.267658] ? check_preemption_disabled+0x41/0x280 [ 1674.272683] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1674.277699] ? pcpu_alloc+0xc9/0x1190 [ 1674.281501] ? __lockdep_init_map+0x100/0x5a0 [ 1674.286003] mount_fs+0xa3/0x310 [ 1674.289382] vfs_kern_mount.part.0+0x68/0x470 [ 1674.293884] do_mount+0x115c/0x2f50 [ 1674.297517] ? cmp_ex_sort+0xc0/0xc0 [ 1674.301234] ? __do_page_fault+0x180/0xd60 [ 1674.305481] ? copy_mount_string+0x40/0x40 [ 1674.309731] ? memset+0x20/0x40 [ 1674.313044] ? copy_mount_options+0x26f/0x380 [ 1674.317537] ksys_mount+0xcf/0x130 [ 1674.321060] __x64_sys_mount+0xba/0x150 [ 1674.325017] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1674.329580] do_syscall_64+0xf9/0x620 [ 1674.333367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1674.338534] RIP: 0033:0x7f247ef967aa [ 1674.342226] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1674.361107] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1674.368805] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1674.376071] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1674.383363] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1674.390612] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1674.397865] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 [ 1674.415580] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (31071) 04:32:37 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xffffff7f, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000007000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000010000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500001000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:37 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 62) 04:32:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000000000003f000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500011000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000010000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85ffff1f00000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1674.657199] FAULT_INJECTION: forcing a failure. [ 1674.657199] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.686319] CPU: 1 PID: 31095 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1674.694244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1674.703599] Call Trace: [ 1674.706195] dump_stack+0x1fc/0x2ef [ 1674.709834] should_fail.cold+0xa/0xf [ 1674.713642] ? setup_fault_attr+0x200/0x200 [ 1674.717972] __should_failslab+0x115/0x180 [ 1674.722221] should_failslab+0x5/0x10 [ 1674.726027] kmem_cache_alloc+0x3f/0x370 [ 1674.730095] ? mempool_alloc+0x350/0x350 [ 1674.734158] mempool_alloc+0x146/0x350 [ 1674.738052] ? mempool_resize+0x790/0x790 [ 1674.742208] ? lock_downgrade+0x720/0x720 [ 1674.746362] ? mark_held_locks+0xa6/0xf0 [ 1674.750429] bio_alloc_bioset+0x389/0x5e0 [ 1674.754577] ? __find_get_block+0x314/0xde0 [ 1674.758902] ? bvec_alloc+0x2f0/0x2f0 [ 1674.762707] ? __getblk_slow+0x6a3/0x9e0 [ 1674.766777] submit_bh_wbc+0x141/0x760 [ 1674.770698] __bread_gfp+0x14e/0x300 [ 1674.774419] btrfs_read_dev_super+0x8a/0x230 [ 1674.778829] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1674.783330] open_fs_devices+0x5a3/0xa50 [ 1674.787406] ? find_fsid+0xb0/0xb0 [ 1674.790960] btrfs_open_devices+0x114/0x150 [ 1674.795298] btrfs_mount_root+0xa60/0x1830 [ 1674.799543] ? btrfs_decode_error+0x70/0x70 [ 1674.803877] ? __mutex_unlock_slowpath+0xea/0x610 [ 1674.808731] ? check_preemption_disabled+0x41/0x280 [ 1674.813764] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1674.818798] ? pcpu_alloc+0xc9/0x1190 [ 1674.822608] ? __lockdep_init_map+0x100/0x5a0 [ 1674.827110] mount_fs+0xa3/0x310 [ 1674.830485] vfs_kern_mount.part.0+0x68/0x470 [ 1674.835002] ? kfree+0x110/0x210 [ 1674.838384] vfs_kern_mount+0x3c/0x60 [ 1674.842196] btrfs_mount+0x23a/0xaa0 [ 1674.845924] ? btrfs_show_options+0xfd0/0xfd0 [ 1674.850422] ? __mutex_unlock_slowpath+0xea/0x610 [ 1674.855276] ? check_preemption_disabled+0x41/0x280 [ 1674.860301] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1674.865321] ? pcpu_alloc+0xc9/0x1190 [ 1674.869129] ? __lockdep_init_map+0x100/0x5a0 [ 1674.873630] mount_fs+0xa3/0x310 [ 1674.877012] vfs_kern_mount.part.0+0x68/0x470 [ 1674.881524] do_mount+0x115c/0x2f50 [ 1674.885159] ? cmp_ex_sort+0xc0/0xc0 [ 1674.888881] ? __do_page_fault+0x180/0xd60 [ 1674.893122] ? copy_mount_string+0x40/0x40 [ 1674.897372] ? memset+0x20/0x40 [ 1674.900672] ? copy_mount_options+0x26f/0x380 04:32:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000003f000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000040000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1674.905188] ksys_mount+0xcf/0x130 [ 1674.908739] __x64_sys_mount+0xba/0x150 [ 1674.912723] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1674.917312] do_syscall_64+0xf9/0x620 [ 1674.921130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1674.926324] RIP: 0033:0x7f247ef967aa [ 1674.930038] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1674.948940] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1674.956656] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1674.963927] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1674.971195] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1674.978461] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1674.985727] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:38 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xffffff8c, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000fffffff6000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000040000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 63) 04:32:38 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500004000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffffffffffdef000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000fffffdfc000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffe00000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000fffffffe000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1675.535037] FAULT_INJECTION: forcing a failure. [ 1675.535037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1675.546866] CPU: 1 PID: 31135 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1675.554755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1675.564112] Call Trace: [ 1675.566712] dump_stack+0x1fc/0x2ef [ 1675.570359] should_fail.cold+0xa/0xf [ 1675.574168] ? setup_fault_attr+0x200/0x200 [ 1675.578496] ? __lock_acquire+0x6de/0x3ff0 04:32:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffff6000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1675.582752] __alloc_pages_nodemask+0x239/0x2890 [ 1675.587516] ? __lock_acquire+0x6de/0x3ff0 [ 1675.591766] ? __lock_acquire+0x6de/0x3ff0 [ 1675.596016] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1675.600871] ? mark_held_locks+0xa6/0xf0 [ 1675.604945] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1675.609533] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1675.614639] ? try_to_wake_up+0x733/0x1050 [ 1675.618884] ? __mutex_unlock_slowpath+0x2b4/0x610 [ 1675.623825] ? __blkdev_put+0x562/0x870 [ 1675.627813] cache_grow_begin+0xa4/0x8a0 [ 1675.631882] ? setup_fault_attr+0x200/0x200 [ 1675.636208] ? lock_acquire+0x170/0x3c0 [ 1675.640191] cache_alloc_refill+0x273/0x340 [ 1675.644525] kmem_cache_alloc+0x346/0x370 [ 1675.648681] getname_kernel+0x4e/0x370 [ 1675.652581] kern_path+0x1b/0x40 [ 1675.655953] lookup_bdev+0xfc/0x220 [ 1675.659584] ? bd_acquire+0x440/0x440 [ 1675.663394] ? fsync_bdev+0xc0/0xc0 [ 1675.667029] blkdev_get_by_path+0x1b/0xd0 [ 1675.671186] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1675.675687] open_fs_devices+0x5a3/0xa50 [ 1675.679764] ? find_fsid+0xb0/0xb0 04:32:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000fcfdffff000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1675.683322] btrfs_open_devices+0x114/0x150 [ 1675.687660] btrfs_mount_root+0xa60/0x1830 [ 1675.691913] ? btrfs_decode_error+0x70/0x70 [ 1675.696242] ? __mutex_unlock_slowpath+0xea/0x610 [ 1675.701095] ? check_preemption_disabled+0x41/0x280 [ 1675.706131] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1675.711158] ? pcpu_alloc+0xc9/0x1190 [ 1675.714970] ? __lockdep_init_map+0x100/0x5a0 [ 1675.719474] mount_fs+0xa3/0x310 [ 1675.722849] vfs_kern_mount.part.0+0x68/0x470 [ 1675.727348] ? kfree+0x110/0x210 [ 1675.730730] vfs_kern_mount+0x3c/0x60 [ 1675.734539] btrfs_mount+0x23a/0xaa0 [ 1675.738263] ? btrfs_show_options+0xfd0/0xfd0 [ 1675.742760] ? __mutex_unlock_slowpath+0xea/0x610 [ 1675.747612] ? check_preemption_disabled+0x41/0x280 [ 1675.752643] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1675.757666] ? pcpu_alloc+0xc9/0x1190 [ 1675.761476] ? __lockdep_init_map+0x100/0x5a0 [ 1675.765979] mount_fs+0xa3/0x310 [ 1675.769354] vfs_kern_mount.part.0+0x68/0x470 [ 1675.773862] do_mount+0x115c/0x2f50 [ 1675.777496] ? cmp_ex_sort+0xc0/0xc0 [ 1675.781216] ? __do_page_fault+0x180/0xd60 [ 1675.785456] ? copy_mount_string+0x40/0x40 [ 1675.789704] ? memset+0x20/0x40 [ 1675.792994] ? copy_mount_options+0x26f/0x380 [ 1675.797507] ksys_mount+0xcf/0x130 [ 1675.801057] __x64_sys_mount+0xba/0x150 [ 1675.805042] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1675.809628] do_syscall_64+0xf9/0x620 [ 1675.813439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1675.818631] RIP: 0033:0x7f247ef967aa [ 1675.822344] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1675.841244] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1675.848953] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1675.856224] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1675.863500] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1675.870772] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1675.878083] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:39 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xffffff97, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffdfc000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000f6ffffff000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:39 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 64) 04:32:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000001000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffffe000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000feffffff000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1676.436641] FAULT_INJECTION: forcing a failure. [ 1676.436641] name failslab, interval 1, probability 0, space 0, times 0 [ 1676.448048] CPU: 0 PID: 31183 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1676.455944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1676.465299] Call Trace: [ 1676.467899] dump_stack+0x1fc/0x2ef [ 1676.471541] should_fail.cold+0xa/0xf [ 1676.475357] ? setup_fault_attr+0x200/0x200 [ 1676.479696] ? __lock_acquire+0x6de/0x3ff0 [ 1676.483941] __should_failslab+0x115/0x180 [ 1676.488188] should_failslab+0x5/0x10 [ 1676.491990] kmem_cache_alloc+0x3f/0x370 [ 1676.496073] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1676.501711] __radix_tree_create+0x314/0x540 [ 1676.506136] page_cache_tree_insert+0xac/0x3f0 [ 1676.510730] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1676.516188] ? lock_acquire+0x170/0x3c0 [ 1676.520177] ? __add_to_page_cache_locked+0x45e/0xb60 [ 1676.525375] __add_to_page_cache_locked+0x46e/0xb60 [ 1676.530400] ? page_cache_tree_insert+0x3f0/0x3f0 [ 1676.535255] add_to_page_cache_lru+0x16a/0x680 [ 1676.539857] ? add_to_page_cache_locked+0x40/0x40 [ 1676.544718] pagecache_get_page+0x478/0xd50 [ 1676.549051] __getblk_slow+0x216/0x9e0 [ 1676.552954] __bread_gfp+0x218/0x300 [ 1676.556681] btrfs_read_dev_super+0x8a/0x230 [ 1676.561093] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1676.565593] open_fs_devices+0x5a3/0xa50 [ 1676.569663] ? find_fsid+0xb0/0xb0 [ 1676.573220] btrfs_open_devices+0x114/0x150 [ 1676.577552] btrfs_mount_root+0xa60/0x1830 [ 1676.581801] ? btrfs_decode_error+0x70/0x70 [ 1676.586124] ? __mutex_unlock_slowpath+0xea/0x610 [ 1676.590973] ? check_preemption_disabled+0x41/0x280 [ 1676.595996] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1676.601014] ? pcpu_alloc+0xc9/0x1190 [ 1676.604820] ? __lockdep_init_map+0x100/0x5a0 [ 1676.609323] mount_fs+0xa3/0x310 [ 1676.612698] vfs_kern_mount.part.0+0x68/0x470 [ 1676.617197] ? kfree+0x110/0x210 [ 1676.620567] vfs_kern_mount+0x3c/0x60 [ 1676.624373] btrfs_mount+0x23a/0xaa0 [ 1676.628122] ? btrfs_show_options+0xfd0/0xfd0 [ 1676.632624] ? __mutex_unlock_slowpath+0xea/0x610 [ 1676.637471] ? check_preemption_disabled+0x41/0x280 [ 1676.642498] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1676.647519] ? pcpu_alloc+0xc9/0x1190 [ 1676.651326] ? __lockdep_init_map+0x100/0x5a0 [ 1676.655830] mount_fs+0xa3/0x310 [ 1676.659209] vfs_kern_mount.part.0+0x68/0x470 [ 1676.663713] do_mount+0x115c/0x2f50 [ 1676.667351] ? cmp_ex_sort+0xc0/0xc0 [ 1676.671164] ? __do_page_fault+0x180/0xd60 [ 1676.675406] ? copy_mount_string+0x40/0x40 [ 1676.679667] ? memset+0x20/0x40 [ 1676.682958] ? copy_mount_options+0x26f/0x380 [ 1676.687462] ksys_mount+0xcf/0x130 [ 1676.691011] __x64_sys_mount+0xba/0x150 [ 1676.694993] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1676.699581] do_syscall_64+0xf9/0x620 [ 1676.703393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1676.708671] RIP: 0033:0x7f247ef967aa [ 1676.712384] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:32:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000002000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000ffffffff000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000200000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1676.731404] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1676.739121] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1676.746398] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1676.753701] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1676.760975] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1676.768247] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000effdffffffffffff000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1676.901900] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (31185) [ 1676.919594] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (31201) [ 1676.951300] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by systemd-udevd (31196) 04:32:40 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xfffffff5, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000001000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:40 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000003000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 65) 04:32:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000020000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1677.315954] FAULT_INJECTION: forcing a failure. [ 1677.315954] name failslab, interval 1, probability 0, space 0, times 0 [ 1677.327192] CPU: 0 PID: 31222 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1677.335056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1677.344417] Call Trace: [ 1677.346992] dump_stack+0x1fc/0x2ef [ 1677.350602] should_fail.cold+0xa/0xf [ 1677.354385] ? setup_fault_attr+0x200/0x200 [ 1677.358691] ? __lock_acquire+0x6de/0x3ff0 [ 1677.362906] ? check_preemption_disabled+0x41/0x280 [ 1677.367904] __should_failslab+0x115/0x180 [ 1677.372121] should_failslab+0x5/0x10 [ 1677.375898] kmem_cache_alloc+0x3f/0x370 [ 1677.379940] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1677.385545] __radix_tree_create+0x314/0x540 [ 1677.389939] page_cache_tree_insert+0xac/0x3f0 [ 1677.394504] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1677.399936] ? lock_acquire+0x170/0x3c0 [ 1677.403889] ? __add_to_page_cache_locked+0x45e/0xb60 [ 1677.409062] __add_to_page_cache_locked+0x46e/0xb60 [ 1677.414062] ? page_cache_tree_insert+0x3f0/0x3f0 [ 1677.418889] add_to_page_cache_lru+0x16a/0x680 [ 1677.423455] ? add_to_page_cache_locked+0x40/0x40 [ 1677.428301] pagecache_get_page+0x478/0xd50 [ 1677.432609] __getblk_slow+0x216/0x9e0 [ 1677.436484] __bread_gfp+0x218/0x300 [ 1677.440179] btrfs_read_dev_super+0x8a/0x230 [ 1677.444568] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1677.449051] open_fs_devices+0x5a3/0xa50 [ 1677.453094] ? find_fsid+0xb0/0xb0 [ 1677.456618] btrfs_open_devices+0x114/0x150 [ 1677.460932] btrfs_mount_root+0xa60/0x1830 [ 1677.465155] ? btrfs_decode_error+0x70/0x70 [ 1677.469459] ? __mutex_unlock_slowpath+0xea/0x610 [ 1677.474283] ? check_preemption_disabled+0x41/0x280 [ 1677.479283] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1677.484279] ? pcpu_alloc+0xc9/0x1190 [ 1677.488061] ? __lockdep_init_map+0x100/0x5a0 [ 1677.492538] mount_fs+0xa3/0x310 [ 1677.495905] vfs_kern_mount.part.0+0x68/0x470 [ 1677.500378] ? kfree+0x110/0x210 [ 1677.503727] vfs_kern_mount+0x3c/0x60 [ 1677.507511] btrfs_mount+0x23a/0xaa0 [ 1677.511206] ? btrfs_show_options+0xfd0/0xfd0 [ 1677.515683] ? __mutex_unlock_slowpath+0xea/0x610 [ 1677.520507] ? check_preemption_disabled+0x41/0x280 [ 1677.525514] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1677.530508] ? pcpu_alloc+0xc9/0x1190 [ 1677.534290] ? __lockdep_init_map+0x100/0x5a0 [ 1677.538766] mount_fs+0xa3/0x310 [ 1677.542133] vfs_kern_mount.part.0+0x68/0x470 [ 1677.546613] do_mount+0x115c/0x2f50 [ 1677.550227] ? cmp_ex_sort+0xc0/0xc0 [ 1677.553920] ? __do_page_fault+0x180/0xd60 [ 1677.558134] ? copy_mount_string+0x40/0x40 [ 1677.562353] ? memset+0x20/0x40 [ 1677.565613] ? copy_mount_options+0x26f/0x380 [ 1677.570091] ksys_mount+0xcf/0x130 [ 1677.573701] __x64_sys_mount+0xba/0x150 [ 1677.577744] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1677.582305] do_syscall_64+0xf9/0x620 [ 1677.586087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1677.591258] RIP: 0033:0x7f247ef967aa [ 1677.594951] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 04:32:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000003000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1677.613844] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1677.621532] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1677.628795] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1677.636042] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1677.643292] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1677.650541] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 04:32:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000010000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000004000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000020000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000006000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1677.858800] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (31229) 04:32:41 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xfffffff6, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000030000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 66) 04:32:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000007000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000004000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400"/188, 0xbc, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:41 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000040000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) 04:32:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000010000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) 04:32:41 executing program 4: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 1678.259095] FAULT_INJECTION: forcing a failure. [ 1678.259095] name failslab, interval 1, probability 0, space 0, times 0 04:32:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000030000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1678.332311] CPU: 1 PID: 31264 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1678.340218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1678.349576] Call Trace: [ 1678.352170] dump_stack+0x1fc/0x2ef [ 1678.355809] should_fail.cold+0xa/0xf [ 1678.359620] ? setup_fault_attr+0x200/0x200 [ 1678.363944] ? lock_acquire+0x170/0x3c0 [ 1678.367928] __should_failslab+0x115/0x180 [ 1678.372169] should_failslab+0x5/0x10 [ 1678.375971] kmem_cache_alloc_trace+0x284/0x380 [ 1678.380647] btrfs_alloc_device+0xae/0x670 [ 1678.384884] ? btrfs_finish_sprout+0x6c0/0x6c0 [ 1678.389478] ? blkdev_put+0x85/0x520 [ 1678.393195] close_fs_devices.part.0+0x263/0x8e0 [ 1678.397966] btrfs_close_devices+0x95/0x1f0 [ 1678.402294] btrfs_mount_root+0x10b9/0x1830 [ 1678.406635] ? btrfs_decode_error+0x70/0x70 [ 1678.410968] ? __mutex_unlock_slowpath+0xea/0x610 [ 1678.415819] ? check_preemption_disabled+0x41/0x280 [ 1678.420851] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1678.425872] ? pcpu_alloc+0xc9/0x1190 04:32:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000060000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1678.429677] ? __lockdep_init_map+0x100/0x5a0 [ 1678.434176] mount_fs+0xa3/0x310 [ 1678.437554] vfs_kern_mount.part.0+0x68/0x470 [ 1678.442054] ? kfree+0x110/0x210 [ 1678.445428] vfs_kern_mount+0x3c/0x60 [ 1678.449239] btrfs_mount+0x23a/0xaa0 [ 1678.452963] ? btrfs_show_options+0xfd0/0xfd0 [ 1678.457470] ? __mutex_unlock_slowpath+0xea/0x610 [ 1678.462330] ? check_preemption_disabled+0x41/0x280 [ 1678.467367] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1678.472388] ? pcpu_alloc+0xc9/0x1190 [ 1678.476194] ? __lockdep_init_map+0x100/0x5a0 04:32:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000070000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1678.480698] mount_fs+0xa3/0x310 [ 1678.484073] vfs_kern_mount.part.0+0x68/0x470 [ 1678.488574] do_mount+0x115c/0x2f50 [ 1678.492206] ? cmp_ex_sort+0xc0/0xc0 [ 1678.495923] ? __do_page_fault+0x180/0xd60 [ 1678.500163] ? copy_mount_string+0x40/0x40 [ 1678.504410] ? memset+0x20/0x40 [ 1678.507695] ? copy_mount_options+0x26f/0x380 [ 1678.512198] ksys_mount+0xcf/0x130 [ 1678.515747] __x64_sys_mount+0xba/0x150 [ 1678.519738] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1678.524326] do_syscall_64+0xf9/0x620 [ 1678.528136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1678.533322] RIP: 0033:0x7f247ef967aa [ 1678.537040] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1678.555940] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1678.563651] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1678.570920] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1678.578193] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1678.585468] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1678.592741] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 [ 1678.617690] ------------[ cut here ]------------ [ 1678.622465] kernel BUG at fs/btrfs/volumes.c:1061! [ 1678.627860] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1678.633231] CPU: 1 PID: 31264 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1678.641100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1678.650469] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 1678.656010] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 1678.674914] RSP: 0018:ffff888096c57838 EFLAGS: 00010246 [ 1678.680274] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc9000a04e000 [ 1678.687543] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 1678.694811] RBP: ffff8880b1b88700 R08: 0000000000000000 R09: fffffffffffff000 [ 1678.702078] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1678.709347] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff8880a2a0e900 [ 1678.716616] FS: 00007f247d90a700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1678.724841] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1678.730722] CR2: 00007f048e564000 CR3: 0000000096def000 CR4: 00000000003406e0 [ 1678.737992] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1678.745261] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1678.752528] Call Trace: [ 1678.755129] btrfs_close_devices+0x95/0x1f0 [ 1678.759468] btrfs_mount_root+0x10b9/0x1830 [ 1678.763794] ? btrfs_decode_error+0x70/0x70 [ 1678.768152] ? __mutex_unlock_slowpath+0xea/0x610 [ 1678.773002] ? check_preemption_disabled+0x41/0x280 [ 1678.778024] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1678.783043] ? pcpu_alloc+0xc9/0x1190 [ 1678.786931] ? __lockdep_init_map+0x100/0x5a0 [ 1678.791426] mount_fs+0xa3/0x310 [ 1678.794805] vfs_kern_mount.part.0+0x68/0x470 [ 1678.799299] ? kfree+0x110/0x210 [ 1678.802671] vfs_kern_mount+0x3c/0x60 [ 1678.806476] btrfs_mount+0x23a/0xaa0 [ 1678.810193] ? btrfs_show_options+0xfd0/0xfd0 [ 1678.814690] ? __mutex_unlock_slowpath+0xea/0x610 [ 1678.819538] ? check_preemption_disabled+0x41/0x280 [ 1678.824561] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1678.829582] ? pcpu_alloc+0xc9/0x1190 [ 1678.833400] ? __lockdep_init_map+0x100/0x5a0 [ 1678.837904] mount_fs+0xa3/0x310 [ 1678.841277] vfs_kern_mount.part.0+0x68/0x470 [ 1678.845779] do_mount+0x115c/0x2f50 [ 1678.849409] ? cmp_ex_sort+0xc0/0xc0 [ 1678.853128] ? __do_page_fault+0x180/0xd60 [ 1678.857364] ? copy_mount_string+0x40/0x40 [ 1678.861609] ? memset+0x20/0x40 [ 1678.864892] ? copy_mount_options+0x26f/0x380 [ 1678.869395] ksys_mount+0xcf/0x130 [ 1678.872947] __x64_sys_mount+0xba/0x150 [ 1678.876931] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1678.881517] do_syscall_64+0xf9/0x620 [ 1678.885321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1678.890513] RIP: 0033:0x7f247ef967aa [ 1678.894229] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1678.913133] RSP: 002b:00007f247d909f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1678.920845] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f247ef967aa [ 1678.928114] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f247d909fe0 [ 1678.935384] RBP: 00007f247d90a020 R08: 00007f247d90a020 R09: 0000000020000000 [ 1678.942660] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1678.949931] R13: 0000000020000100 R14: 00007f247d909fe0 R15: 00000000200000c0 [ 1678.957208] Modules linked in: [ 1678.965318] ---[ end trace 6952581df65ece8a ]--- [ 1678.970211] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 1678.975834] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 1678.995354] RSP: 0018:ffff888096c57838 EFLAGS: 00010246 [ 1679.001197] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc9000a04e000 [ 1679.008561] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 1679.017187] RBP: ffff8880b1b88700 R08: 0000000000000000 R09: fffffffffffff000 [ 1679.024917] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 04:32:42 executing program 2: syz_mount_image$gfs2(&(0x7f0000000480), &(0x7f0000000580)='./file1\x00', 0x0, 0xfffffffd, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@discard}, {@statfs_quantum}]}) 04:32:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000200000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000000000000050000000000000101000"/114, 0x72, 0x10000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) [ 1679.032484] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff8880a2a0e900 [ 1679.043475] FS: 00007f247d90a700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1679.052300] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1679.059716] CR2: 00007f33ad738000 CR3: 0000000096def000 CR4: 00000000003406e0 [ 1679.067056] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1679.074624] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1679.082358] Kernel panic - not syncing: Fatal exception [ 1679.087883] Kernel Offset: disabled [ 1679.091511] Rebooting in 86400 seconds..