superblock checksum mismatch [ 657.168815] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (6499) 08:30:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500f6ffffff00010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c8cffffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 657.228367] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (6483) 08:30:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="40000000040000002e2f66696c653000"]) chdir(&(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xfb, 0x67, 0x80, 0x0, 0x0, 0x10001, 0xa0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x10962, 0x2, 0xda5, 0x5, 0x9, 0x3, 0xff, 0x0, 0x151, 0x0, 0x1f}, 0xffffffffffffffff, 0xc, r1, 0x8) quotactl(0x1, &(0x7f0000000240)='./file0\x00', 0xee00, &(0x7f0000000280)="7ba11afd687ff44322971e5f1fcf1b55ceff52eaf9f14202ff106c6a71c2b4189e7a6039e0fd3f4a96fdf9ffecbb8e014d1bfb12a36a93fb71cf48da77c6453ee7592e211010b9af584938f6bc11646ec835e2a23aeed1ea3e8cd0ae06ab1aba597bf9e3891e0b4e6e651881e61e0ebc57464b9f3105198254a09fedb29594b42b192f846a8629e1808a09e810e530042fda473984b56837a37dfef43856cdb08e717a5c1d166107622ba5125f8d10db2c83ac79b46f35755939817ce04cf8ac169bc9259753ce9db0cec52c239f9af6e2df89e7c8665f97085fc41aa71318c68940c1") 08:30:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000074010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 657.394779] BTRFS error (device loop2): open_ctree failed [ 657.456129] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (6516) [ 657.493219] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (6524) 08:30:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000001000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f0000000040)={[], [{@obj_user={'obj_user', 0x3d, ']%^/^\'-('}}, {@context={'context', 0x3d, 'system_u'}}, {@euid_gt={'euid>', 0xee01}}, {@pcr={'pcr', 0x3d, 0xf}}, {@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '^-)&'}}, {@dont_hash}, {@seclabel}, {@obj_type={'obj_type', 0x3d, 'btrfs\x00'}}]}) [ 657.519077] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (6519) 08:30:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500fdffffff00010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c97ffffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 657.696979] BTRFS error (device loop2): superblock checksum mismatch [ 657.717815] BTRFS error (device loop2): open_ctree failed [ 657.745192] BTRFS error (device loop2): superblock checksum mismatch 08:30:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000fffffdef0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 657.808179] BTRFS error (device loop2): open_ctree failed 08:30:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500feffffff00010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 657.944901] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (6560) [ 657.959325] BTRFS error (device loop2): superblock checksum mismatch [ 657.965530] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (6535) [ 658.021038] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (6562) [ 658.049886] BTRFS error (device loop2): open_ctree failed [ 658.066944] BTRFS error (device loop2): superblock checksum mismatch 08:30:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000007a010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8cf5ffffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0052c8a719ea644ceb476382c8a87498bf4c51c1ddff000000000000002320c31d9bf161b442e01349cea0"]) r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000001c0)="33be4f55202a93d9ab567b96b1ae2367580539524fa5e4e04f0db980ff05272036ec12799930f141d5c416e19c253178df2a7f99fcd06c7889f923426dc7d2983482782f8c6d6c0d61cc3b2b512d78e2864784634ff73223d247a1158d734438b2f7fc8a86fc7ff072752999171760030ff65bc83cc59744c6e546344cfa5a195d18861e8e4a095241a2b73e41a6aa84", 0x90, 0x10}, 0x4081) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x200042}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) recvmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000040)=@rc={0x1f, @none}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1}, 0x8}], 0x1, 0x2000, &(0x7f0000000300)={0x77359400}) 08:30:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000fffffff60800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 658.106987] BTRFS error (device loop2): open_ctree failed [ 658.263498] BTRFS error (device loop2): superblock checksum mismatch [ 658.280465] BTRFS error (device loop2): open_ctree failed [ 658.318163] BTRFS error (device loop2): superblock checksum mismatch [ 658.331378] BTRFS error (device loop2): open_ctree failed 08:30:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 658.371247] BTRFS error (device loop2): superblock checksum mismatch [ 658.391641] BTRFS error (device loop2): open_ctree failed [ 658.411507] BTRFS error (device loop2): superblock checksum mismatch 08:30:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000fffffdfc0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 658.479125] BTRFS error (device loop2): open_ctree failed [ 658.494093] BTRFS error (device loop2): superblock checksum mismatch [ 658.501221] BTRFS error (device loop2): open_ctree failed [ 658.528247] BTRFS error (device loop2): superblock checksum mismatch [ 658.619729] BTRFS error (device loop2): open_ctree failed 08:30:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8cf6ffffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000002000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 658.715062] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (6634) 08:30:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000fff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:17 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020cdc9b352b4"], 0x191) close(r0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000240)=r0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020cdc9b352b4"], 0x191) close(r2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000200)={0x6}) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x8) accept4(r3, &(0x7f0000000080)=@l2={0x1f, 0x0, @none}, &(0x7f0000000140)=0x80, 0x80000) 08:30:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000fffffdfd0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 658.901644] BTRFS error (device loop2): superblock checksum mismatch [ 658.901990] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (6660) [ 659.000932] BTRFS error (device loop2): open_ctree failed [ 659.003593] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (6669) [ 659.036946] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (6674) [ 659.038241] BTRFS error (device loop2): superblock checksum mismatch 08:30:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000003000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 659.143289] BTRFS error (device loop2): open_ctree failed [ 659.192847] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (6669) [ 659.211351] BTRFS error (device loop2): superblock checksum mismatch 08:30:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000fffffffd0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8cfdffffff0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000040000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 659.321006] BTRFS error (device loop2): open_ctree failed 08:30:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000fffffffe0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000900000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000004000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x9}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r0}, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000000100ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 659.629938] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (6725) 08:30:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000a00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="52c177045719c100"]) 08:30:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000effdffff0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000005000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000fffffdfc005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000000300ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000b00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000fcfdffff0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:18 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) fork() r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x162, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc0c0, 0x0, 0x1ffffd, 0x0, 0x101}, r1, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) mkdir(&(0x7f0000000040)='./file0\x00', 0x188) 08:30:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000006000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000c00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000000400ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) ioctl$FIONCLEX(r0, 0x5450) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 08:30:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000fdfdffff0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000000800ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000007000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000d00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000097ffffff0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000003500ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000008000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000e00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000f6ffffff0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000009000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000000b700ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000fdffffff0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000010000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000fdfdffff005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000003000000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001100000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000023000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000feffffff0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000f6ffffff005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000004000000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000060000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000001440000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000070000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001200000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000008000000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000044010000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000f0000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001400000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000100000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000035000000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000030000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 663.694188] BTRFS error (device loop2): superblock checksum mismatch [ 663.728890] BTRFS error (device loop2): open_ctree failed [ 663.747398] BTRFS error (device loop2): superblock checksum mismatch [ 663.763120] BTRFS error (device loop2): open_ctree failed 08:30:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000030000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 663.820805] BTRFS error (device loop2): superblock checksum mismatch [ 663.849066] BTRFS error (device loop2): open_ctree failed [ 663.904241] BTRFS error (device loop2): superblock checksum mismatch 08:30:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000048030000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 663.956436] BTRFS error (device loop2): open_ctree failed [ 663.986878] BTRFS error (device loop2): superblock checksum mismatch [ 663.998315] BTRFS error (device loop2): open_ctree failed [ 664.007518] BTRFS error (device loop2): superblock checksum mismatch [ 664.104093] BTRFS error (device loop2): open_ctree failed 08:30:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000b7000000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000200000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000090030000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000002b00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000002010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 664.391849] BTRFS error (device loop2): superblock checksum mismatch [ 664.396921] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7139) [ 664.558510] BTRFS error (device loop2): open_ctree failed [ 664.567155] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7142) [ 664.581095] BTRFS error (device loop2): superblock checksum mismatch 08:30:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000050000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000300000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 664.619128] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7152) 08:30:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000002f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 664.694871] BTRFS error (device loop2): open_ctree failed 08:30:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000003010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e580)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e780)={0x90a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x6, "a479c9fbce01d4"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049380)={0x7fff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x40, "cd9eda9e438dfd"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d080)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "62da5c28b18463"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e080)={0x9d, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {0x0, r3}], 0x6, "cc0ee0a11e05f4"}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x42}, @mcast1, @mcast2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, r6, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e580)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e780)={0x90a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x6, "a479c9fbce01d4"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049380)={0x7fff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x40, "cd9eda9e438dfd"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f000005d080)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "62da5c28b18463"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e080)={0x9d, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {0x0, r7}, {}, {}, {0x0, r8}], 0x6, "cc0ee0a11e05f4"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000046e80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x1, "5a84db49165dcf"}) [ 664.927850] BTRFS error (device loop2): superblock checksum mismatch [ 664.934832] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7174) [ 664.971372] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7175) [ 665.005197] BTRFS error (device loop2): open_ctree failed 08:30:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000400000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000004010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 665.024623] BTRFS error (device loop2): superblock checksum mismatch [ 665.050450] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7186) 08:30:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000003f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000060000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 665.134354] BTRFS error (device loop2): open_ctree failed [ 665.240730] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7202) [ 665.261904] BTRFS error (device loop2): superblock checksum mismatch [ 665.269468] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7214) 08:30:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000500000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 665.300188] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7220) 08:30:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000004000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 665.371629] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7217) 08:30:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000070000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 665.536911] BTRFS error (device loop2): open_ctree failed [ 665.554602] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7234) [ 665.568551] BTRFS error (device loop2): superblock checksum mismatch [ 665.594686] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7241) 08:30:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$xfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x9, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="78d7861fb39bc6ff18dad41cb557a68a77f7087dfbef7dd532469bad9c927037c3db93b54b0a44386efcba205fd649f95a1d8c5c7b", 0x35, 0x5}, {&(0x7f0000000240), 0x0, 0x2}], 0x800010, &(0x7f00000002c0)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@grpquota}, {@grpquota}, {@swalloc}], [{@appraise_type}, {@pcr={'pcr', 0x3d, 0x30}}, {@dont_appraise}]}) openat(r0, &(0x7f0000000340)='./file0\x00', 0x80, 0x1ff) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="005a9a616548db161baf0f4c4cbd8bde39b16716a6b0378eb16bf1ac3bb650c8065e8d6f8db6c27ef5744e99dde810ca064c1b4742f10e874dd779ffb97028491b0634e004dd20a5a755fbbf58757eb7cecccd3fb1fe7ca833a81caafdf4cf26359862c0c3795d14241f50a32530"]) [ 665.704030] BTRFS error (device loop2): open_ctree failed [ 665.734193] BTRFS error (device loop2): superblock checksum mismatch 08:30:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000005010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000008000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000600000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 665.756697] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7256) [ 665.833298] XFS (loop0): unknown mount option [appraise_type=imasig]. 08:30:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000090000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 665.915465] BTRFS error (device loop2): open_ctree failed [ 665.917664] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7279) [ 665.935352] BTRFS error (device loop2): superblock checksum mismatch 08:30:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000008400000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 666.057628] BTRFS error (device loop2): open_ctree failed 08:30:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000700000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000006010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000002c0)="9a2d8bd3be5ce4f16deca674eeb2db009ec19179f6fee3a2f40bcea86c332c133d96deea44793b08ed507eeb00f0904190c2f4a894cebe7d8fabb6bf19ea20508f6cf7fc6d84102e26075233d0fe585b6a98d0e6b3bab495bd9c3c936ba31e91ebd796f3586acdec38f2c17251900c37b0f43292d6af927fb6f3d64fe28e677ed17f16ce8017f3f74b67940e40113a11ff959248d770676f50406ce442726278635ff83fce", 0xa5}, {&(0x7f00000003c0)="61a93e993bc51f1f44d6c97bea3d06bc0d64ce43c93e52b64264eb56f58e10a81c90f24bbcc5996fdb1de936fc336cc58591ef7745a585e9ca561eab4b528b81d403b2d28a437556ab5d3088d31a820772a24ee8d4eb620b90d372f991202d97dc59c8d332eba05667cdb91a6019318682d24e7933fd3e7bd092997a70248cb7a20c8edfcc3d5ff811e984eff4b5c34f5e", 0x91}, {&(0x7f0000000a00)="06026764e9db5d095c9dd8d8f3aca804932b83cedf2f86150434a301e6070171587499fe41aa0f4367ce00c3f15a4fac5d68de96652d7fd8b2bf56d3eaa7477c0ac96b72c5e9c711eee2081531da100349b9f5616eb5ab97c652b1c0bb14d3e761816ae19efdb9dcc95047e3136f42731821d0cee2e39e8f9878eae17fd7b434783e83b0a3bd076bcd0d14ebe491a135f31bdc7e48acad5205da438d54f87c1f78b94a23766eb3286c82fc3198f08ea9dd1864440c50ca0ac337b81ae129473457a0842dd606bffac226483b9e22a94eddee5ee63972778db213fd50357a2f009393f4fe7bedf1164bcfaf40a08d2fc9953fb052bc1b6f7c3745a8c1f4d3a202b9578f0ae4718bdd6ca807f53f2d1270684ace8ae7fc9bb6fd1888403cd03fb19fc4d01efc6b024471e92610ee8d7bf024347538bfd22406424a71f4cec002bce08a7b1c2d4317c351eec744236892486c9b0bfb35ba915bdfad6097c1e7992aee6a0a85cd66b2181bd681d7c70d47a4e5badcd5796fe46d977de6057f5002ae1737b3bca579d7f7fa656422d3414905c5857534a4d650dd1a608ccbdfbae084c35a99aefe5f7a2d6af8d28ff5e906bc30b2cb49b908b78b99d3f24d7204d4d11b3f91c8a305909890aac919c31fc383fa77c0c9049f82a938c9e255a06d65728d30a4a14a25c96c1bc2bb1ae127c5ecc52c02d01c6424ee49b89434d18f04756f1a297aa8dbc7bbcec2c67cc4a6a52d452eae3b6815f95ef8eeaf7a988d15e65bca565e5e5af52cd62baf659a05a4729d3f1a38ebb586635da270a8e33c06aeee63af45ca594c952bcf0214005ca0cff940828d05b2330c78153d255d50b7984bd3fff5d793c4eef8b88653446aeb2c567138eab4537cb74dbed868dec87fa0197fb81e8089b24c3c9741d760cefc5f16f5cd18ea24518ab650384fc91bbd53cf30f83b1d6ce73fbf2275bda5f0be2a3db9bc0864a9f640801bb98da4c9d0683e9b93694773e580dbe1b606bcb578edf3ec0d73ab429528117b8b48f178533bc17e2763860c0a4fb64db4c7e742a2598e6aafed4df777cf475f5010125d473ea51050793fd08d917145ea2c256039e18dd35f35cb73e58bf286dda7a60cdbfccdca5c84412710bb85402a4e9c41dcf3d4bab08fd1d5e8a83fd47be5dfc9063705923e9526ddcbd2320de2103512069bee9eb56c613ad584dad390f6e7a35f5926884b67fe9090a0b5800b7d536fc01fe2195ee7f1724ac20681f8c324841b8bf027903555b798eda073cfc7f55ab9a3d58eb778f0a490f596ad8b1098638bdde99211fb5c02e7a2787e955bb75c6429eeda2b2df5afc8c7ec1fba36a53e1bac94483e896f17c2121701f2809aeb6db6221b700dd82ce07dfec1e63656be638f24a6a9b3ec82398f8e759e5e893a7d18c036b2cc39d7e925af42199482c8c665b42818ad4cc825e2c819ee45fa191a78f071590982f65b276463925c31fa3154211e9b023b5c0c7635bca0a0c6698fd6738e936123c3d048856896cbbb01b46924795cfbb59b41036afbef5d0da5b5cc6408625afa4bcc158ac742b4a03a8775b617195e4728f5a346a050559d8cd0a588d5c3b37cf7ef888f65faa30b68561cea3877bc41e79f21edb6e792c8c8f6b9cb0b607ceadb1af690101cb304fb09a70784d481d13d39bbc499c18c6d3832841e6c1f17ad8f0e60b8b6a3f2ac6ef4affdeecf03c1b99dc07f7273fea0916b711ecd32f3ddebce10d1f06ad149198c8735db39f0978b781c143f994605531e7a84f2be93d73d0cf0e0c6c4687a468e4d48b971cf382116a84825ffbe8441f2041f70317d574309a5fd81a6920fca82581384daa07c677636081b694f12a9e724412f914645d0841df2c00592191aa550549bf21a6d2e138696392f7d0d5e5a43d3d366a9f32d6b8863bb0b02ba54e35bdcb481a12a88dc3d5b74f36715d91c1548154de4d12db4e82a2447f66179899e6fe45905da8cb374c8b9b496e5e75c2ad69ac84991298fdef5699bc65cce00fb4b09a18659b6ae4d03732051c50a97f745bcf136bba6c1148e5490a830cc92590d6ad41da83e2fc4e0c333f6626c8ed7c85bd5c1750b7ba34277359782bc1c5c98af0287aa76d96e84a1b85f2b02bd6116ed532a9527800fcaa05032aa9030080c96ed1b95bfe0856e75227cc4de707d2774e7667e00e802c8035ca5fd9fee874c5dfaa194195520a7f002407e7c80a5748492b2cc5de474f8ee51bf0e75390bcbeae27ec97f601293901f8ecd9733668607672cf15653c3c8afceb246d4c30f6bec81b272180f33a25100051bd4ccd4cc35bd039885af41a0eed12561472d3d33e4188840dea4e9a4cbc40e60f050fd2d02457dc9abd538dc5f8570989a5080a333967de5d32dfadae4c6a96c129a6504ad649cd125cb38144527c08b4d7f4d0f5f1a395eb04a08b4dea92e3500721a2ed11e501497c6be2adb673f5fb888780f401817a8142c6959290afe607975e767f82bed63c56c697ea054bc5b34aac4e6ea6f2567cfe344a88b2cbd6bdc144f752bad9baaa41f983c1268ceebb88e6d6bf778a8201cc168753b02fd3668100d557e51d78c632a271112c14b590a04b680ae742a3e457af9b4923556122cf0bdfd8a7db9bcd56f41d958f99ad55be47c1ff7d7a04d07ff9ce8c86e52f339d8e37f9d69d8f67bbe0cb548e40fd09e2de059a7d63a6b0ebcb75c0a3de3ce486b6e6cc52b5d59c5fb96a9a95ddd290540a5981f1cb3abdc316c720cdd92cef3dd23540adc8aaa505c90b5e6e680fd506d7719864f8e24ae6226ac08ad3d99a862c8625d43eb671299742cfcd50aa8bf9fe1ff87d6f9ddc70c8f78de714c26bbe35f13d789aa4138f322d2f5f066cd6174c0f1097f85a311126fdc9ff21ac6f22cf080d7202bcb29e3729939335c8afd3621b9494856d9da69005c6f08ca3b798f56c940b8edb49bbf03e0abd285b952c4a9bc5806fb4d66d1aec8c971ed4e166b1aa4d3d80a52be54449904c4dfe74335fc54eba513799c5bdeb6fbd4bd7846d80bf0065e56a1360ac79f446d6cf1e1c02540793efef24b9c66fdb788638c5143a264eb5aa3985083b5a6aec94b59075437594e44f4dcbad88e27c9382a745c6cc7ac004b0e09ff9ffa1c40bf23679202490fd5bc4ea2ba84fee2b6ec0255ca253aadd68ae714d4ef03147e2d0e84c7e696ac7ae684c90bfc3d40f10a36fbf8bccce445059fa4b3ffe9effd4e0ae6763c8692a9556f7d6f33cd07989e5c7868c6796e55a551aa6e4a26b504607e6746403c4f9a117fdc153197504267695dfc1864f2d89a5deda09993dbc3ae6883c4f19f96e1586102e104192deaaa33fe2f3a2ca1e7456ac1bacf504f1c86cd22f9db520514f83fd93503fccfc6c22fbcfb93ab28028750b8993497f01fcac07607b3440368af7e72639e8003a142a4d402ee16a39251cb611c72ad78bf03e26e9108c350d91698e812493847dc05dc7849c552c1d60800ca4cfbb1e720630d8659d88bbf84a19916099c88c38a92b35c407582e679adb3ca61c73947c7c6bca083ab7ee28411f5f6d18c4b0d5161fb57f036525bd7d8404ac5a2a5e69dcf343c3b9e55ec00f8b07cd61f71f6cc901cfdc49a90906f3300bfda00e8b4ee199cade6dfdfffbde4caff0d95f72f6242f926ca0ea39993867892758a5e94264d0f28fdde18ecc9d17825fa3011724d10d52366230477208b999af604d70f1d51779473f02c35216ce97bd329acf041364dc04ee95b29263fc469bca79c3603224d2df21d4cf57158612a22999107f9ea0539065d7d84bc56641a32667f2cd626fcf699abab6faa8e9f3133cb3b77eaad52f8daabad9728e368573d57e23d0cbcec20ae46193e66ea829c252ab2adbbdddc535e64c9921dda42cf20d13bcd31f684941d65b6fb2577a0fe66c8c4f0cf2b530ee4250f6a3c27a946798633fad79dba03ac278fa19fccb5fa2254ca6f1ec84490a8034a56380e02b01bd03bb1b5f0f7ae000daa654dbed6ba43d9e39ea0f16f67d2218cb68aa4f99eee10a9755c71c6c10c60bb1d801850848eb3ca4f9f5c4808e5c9c25df169752b24e31f0fc057f74b5fedb6aecd900908cdc40b6fad7ac9df5aec5f82da721757c5fadfb150bf9e93008b39f63ba61cda9a54f8df9d6d804a465710258fce4601c3b57554b6616dc92aa5f45edd1d59451f4c9469d609242c31c64d93b4144f5901841a57fdb7cf4bd32cb1c19068bc9e5a3a27a8ff3c78e7b3596e1cc5b6a31bd1bd1bd1777b54e307a26732429c4da56ea1d4dd0fd5cb86833409484df0d8bc71144084f4b199e416a776e880d410bc8fb2ce0fffb31504c8ffe866aaa09601f5d33bead22c4e9d6834c2cff7d1240b4ca393c644684d372382f42313008838827c20aa655c91f212510310c7809bca2b3a1efbd658c9b7f75fbc93f6c06216273499681ed39884a63bb6c356a2e54c4b96daeba0dd55bbe6f07e26e1cd4fe309b678fa894a27b0bf39ec1c66a57225ecbd2942f34ae569a2a324cc7db3389265f8e81f2cad957d285e44d9f608f34031d527c2648b85d4ed2f1d15ea76b84f4af65bb1ba4d9d981c5efb6f009d8f2383ad745b8e4a781e352f56d70155d17945f7702bcb4d6a6b05004edf7427e1c5b562c414bb7db55a4084272389a6b77f0cedcdab040bcc65322ea3b3d6ec210c88ac8b2a3146aa738fc33f9fcce92b4d1372efdaccebd3c34ae23d4f502c3cbc2ca781f7c8ae80ad0232c7e0a93aa145dd8870c4bdc8fd6a9dd97e1a9ab3ffef00466defd6b86a761821bb3f3870c614505e35f598915b76de86005c5fabba846af1a3b83162634187f191eed25853011c87488fdb978b55c99055cbe4b88893bcec5418ebf8b1fad14cf076c160446136963286b3ba0bf1c95dc1a4e4cd38c7453048877b74b57b47ebbb36426c33182451e5e81a5cd7e5c1a4ddeaa5f47f85135566092b842df8847ce0d6e217f5551e625fc41b2cde79a96e25917d1d2f6ccd3ed60d984c97b0c31525deadba29a57b2ab67a762947df0035e30541e2ecd6cba057a4b42937fd2b80c258c725452390a20489e200917e9f4085cf07888786873a1bef1744d3871db8fe0305f4470d794779f9721c9188506a64097cf6df0fe7b2658099894f819fa622cb0a7370710340ca62a16f9c811d8f0a3c14492d55c71f6e34a9ae952475c7ecabfcf5acb058a6db76e57f00cc7549c089c0f764a0a4b04e8cf828cfafd7beb369cc6df00a0fdc96ba747cebc34bd55db7f65c2b6f9c549108de7d71025186f0b86546e45ffcde98665a14f95cb6fdae11d927b87faffe3c85c56f17bdd53fcabfb8f5d7883b8b50ef535335ed327199477b543de21347a4520e0095801dce3ba345b6af9465b65d03bb2ec9c00e07ee1be6a1fb5b7aa3ed1b05fbfe340f1d4ace7cfa3236cd275212f252c1545b27f0c2f65749c8d004fe92d35b1ec6aef5188625d901cd7df765e63c81b0d8876b97732ae6b9fd703d5b35762777d20d788eedaf3476ecfdb45d698b66ef82b04259f8b72c7ff81e8f6bfba84ce22c455d2ed625409740c8b6f93a207c71df07b3163dd739b2d857d99da324662d02fe3c296ac3613c412815750b55f6936c8956d84e1dcc5cf0517dcc6d72dff304e507159628bc717cced1492a9939f3508951e34f631fcb4e509f97c9c9be55804d48eb806a2c28d506f78e181d50c4e14e2b0bae774088947490a43be8044d073922e75ba7bfb5737945cd580c1af25fdede72", 0x1000}, {&(0x7f0000000080)="7df5c5ad3ed97871a910abca3d30881aba1fac608b0777dde0bfd8ec08f0c2fb7f458c34307d961f4a45d03cfdd2d9ebad672b2fc919bfb2d4c835d48795a45445cf0c5405fe32d43173edac4a452d538b342726b8d15ebd077707f07dcfcf9b0b428c54591292c3641b03729b211efd4f0f9b22184dfc3aca826dca2d", 0x7d}], 0x4, 0x7, 0x1) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020cdc9b352b4"], 0x191) close(r0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x4) 08:30:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000001f0000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000079f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000200000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000000007ad00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:25 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = signalfd(r0, &(0x7f00000000c0)={[0x100000001]}, 0x8) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x2, 0x81, 0xf7, 0x1b, 0x0, 0x8000, 0x1844b, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x1, 0x4, 0x687, 0x6, 0x1, 0x5, 0x9, 0x0, 0xfffffffd, 0x0, 0xce}, r1, 0x1, r2, 0x2) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='\x00']) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000001c0)="33be4f55202a93d9ab567b96b1ae2367580539524fa5e4e04f0db980ff05272036ec12799930f141d5c416e19c253178df2a7f99fcd06c7889f923426dc7d2983482782f8c6d6c0d61cc3b2b512d78e2864784634ff73223d247a1158d734438b2f7fc8a86fc7ff072752999171760030ff65bc83cc59744c6e546344cfa5a195d18861e8e4a095241a2b73e41a6aa84", 0x90, 0x10}, 0x4081) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x200042}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 08:30:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000200000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000300000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000007010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 667.007607] BTRFS error (device loop2): superblock checksum mismatch [ 667.026751] BTRFS error (device loop2): open_ctree failed [ 667.041683] BTRFS error (device loop2): superblock checksum mismatch 08:30:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000400000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 667.053373] BTRFS error (device loop2): open_ctree failed [ 667.062413] BTRFS error (device loop2): superblock checksum mismatch [ 667.071262] BTRFS error (device loop2): open_ctree failed [ 667.085836] BTRFS error (device loop2): superblock checksum mismatch [ 667.134725] BTRFS error (device loop2): open_ctree failed [ 667.160700] BTRFS error (device loop2): superblock checksum mismatch 08:30:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000000007f200000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 667.192098] BTRFS error (device loop2): open_ctree failed [ 667.246593] BTRFS error (device loop2): superblock checksum mismatch 08:30:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000230000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 667.341666] BTRFS error (device loop2): open_ctree failed [ 667.371013] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7415) [ 667.389871] BTRFS error (device loop2): superblock checksum mismatch [ 667.439526] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7421) [ 667.454147] BTRFS error (device loop2): open_ctree failed [ 667.470237] BTRFS error (device loop2): superblock checksum mismatch [ 667.477330] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7393) 08:30:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000500000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000200)=""/142, 0x8e}, {&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/74, 0x4a}, {&(0x7f0000000380)=""/35, 0x23}, {&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/4, 0x4}], 0x7, 0x6158, 0x9) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="a9ba0abe36d5c117b04f3200"]) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x81, 0x2, 0x8, 0x4, 0x0, 0x1, 0xc0800, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfe05, 0x4, @perf_config_ext={0x7ff, 0x9}, 0x880, 0xfffffffffffffff9, 0x2, 0x1, 0x7, 0x1, 0x8001, 0x0, 0x5, 0x0, 0x7732}, 0x0, 0xc, 0xffffffffffffffff, 0x3) 08:30:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000200000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000008010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 667.587232] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7439) 08:30:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000003f0000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 667.804013] BTRFS error (device loop2): open_ctree failed [ 667.817438] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7454) [ 667.838217] BTRFS error (device loop2): superblock checksum mismatch [ 667.894148] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (7460) 08:30:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000300000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 667.954379] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7465) 08:30:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0040, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020cdc9b352b4"], 0x191) close(r0) read(r0, &(0x7f0000000340)=""/89, 0x59) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c653020cdc9b352b46c052e42edd7e3660d662327b5db5a2f2a10d312bece895fce48544aad0c2157e1100cfe6a"], 0x191) close(r1) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000300), 0x40, 0x0) write$UHID_INPUT(r2, &(0x7f0000000a00)={0x8, {"b049393f904b6fd67c69ec5072a900c181cf37802d13089beaf488967718d5d00cb26dbd714965203bb46252f284c60061ba438ba0a45584ac218563edad032b5a0e28b2873f08df76f5cd7aeac17da4c555c92aa67cac8c598aa8903b802f2640a0e7f42bac57fc7d8935fff3eef76d6f62b837243f9b6597cdd5c7f5ffa027021e3c48845c48ae4e0f5408ef7643b21da9580c43d69c20f4dd82e883a5ad6ea85763ec583c1142b197e717e9cb28505d46a8c56466c2cdd48359a8b522824157010a22cdaa9b3b1954c018cd72a0854f98825134147c85160c9b9147d035adf1b47aa05c1c37c3ff10351e4d3d2f2027a3285a7c9ccfd7e18daa5c165eb9a7b72c9038175ccdcc0b1028b97ad369f8c270e5596e095fe29de4afb7fc1d84d826704521154cfa2481db670a872fe41cf11219a4eb7ddce0418115b5e6ef016ad514bcb4490b9d1f77f5a2142f4f686f38b003ba5b8fb7a56041661f1a49534fd6a6e6b99e3faec96c081424ab1fc39026d9c4d6ac7ebe0b980b89b7942d21086cbd4565451cb6608fab0764b1b66ff18f855e03429bb063c15c199bb2033dfc4f922d05e381b830929640605badcb729d0cc4addd4b010efafc0d796f9003144e8058753aa3e81cd2253e1c400e86f5e1b20860751f82b4f3940c74ac1496ec60a10073a94026dcdcc7f015b31a15db97ad3b143c5df108ddc9f845b040dac4c4c690b860b3793c3515fe0f3369baca2f7356810fc6324b6857eb053e86fcd4ce2f76149c5be14248ab4ad3dfb2f8df0751801833d41a84834f23bc55343c0573d32326a256791f5929a3e5489d18e1debb89d9f00c66f961092aca6c56f418b971ef9405ca65340e4c92d8c81b0bd41e0e2614cda6db99bdf49f8b3d81efcf439396361f129ef9c0fb5d7b3c5b2d83c3af48e60a9aa06381150ff512b5e2caffb838e5434b7a26588ed7035c2fa8035218bdd382900d11ba3b267ce08bd40b138500ef5a34477f9730fc016767fd727706b77cb4d6097feaa7ed341be03688131dfb8cbdbecdd1c4489dfceaefc7b396b8ae444946601aba5fb074ba6188bd33fb9a94504e9fa2a0c4e1e211d890370b6d8bf41f22804dc08ebdb431b5ab12cc3a95232cab014c9f2870b878de0b4b6c5080aa2819e1f84fe43c92a41460ea9482f2dc356b981a94b96e70fa855563a99c2d9fc3722d5aac0485ba440144d00d6ef4a136bed8710a89c3a49dd54eb7899ecb5e9e65ad0319be038ff64df33244632f3c61c8ca5c7425ff26bb219de1e25d3782b4fcf2e07ad5b0446a3dc502987f6392f1a7ba1859242a3e447a241a7b02729374faf0db68beadf24daf7e7eaa38d25b1330597a1ace5fd29ba41bfae4d85bad6d1840e08a21e7902e896f692fbd6cfd986b36992bf10c9fea8bd1c50d71213d276d218e2edde34fff28ec1646c3be92c50176f3b1fbbf0c2285d326c9f7a977df525c999ead3e517214eddeb863e3c598073f5373feaafdc2b7ab8cc4d49a0b42af60f5e0ac9c1ccd0ecb6ced6dc329ea4ff6bec03ff9f0acb9eff798d0962f39267475e48dff1eb1d4491a293a558e533caf6270aa13b923ffcb744363f00367680940c9f68f012a99aa1ce6ffb268b980a8f5ae6492e342ee2dfb84c57c63117b4c4eac97e1555bf72711b40583dad92e1b4c0a1ebaf8e1831fa3be2259549e57a11b2283ee96953993de8c6b97785eda2fff27fb97750d58849c8cd04da001eec9166fb95a9d538b735f8e7b0e7bbf0c1100dbe89c23eb5c0c331878a3769839cfb8ae3ae71e54cd55d07d45576488a294791c05e13f7ea72c3e2f03974122d313312ed877a097f791e7abc9e703ac27d1f4ca9aafa6b9708664e570e0989ba18729fa6132c6def83fbfaac06058c90f81253d7da8870b94c261259cb10c6f4b6ab01d71b4b352357622f33265e77dd9c9143ac66f10f6410c5587b52f74b1d38a6ff12d5f456fcf1197aed9871daf69b4a9693aae07e036e5176d67a9db829b79f7d9ebf636f7a2d9c17d76a2b2cfa996e0081a08dbdab15bd1ade2a5464c0688c75090d8fefa26532d11b2c38f1276c9aca5e5278c6ce3f01c7d58c935de0bdd48be2b8b8dc3018bc900bc0dae68cc4b3d3b6fdf15bff06c56bcc6fec377b2ec8cd68c2c0761b05ea5b37c0a951e525128dcd9792b9979e7d1d3f0d9cb5f797dfc38caf82feffd25d677025eaa717c4d2d008eaa1344b3f176bf0776551bec075c15b22bde2f29dab622526d7903d23bb31b07001d51afbe4d31ccfd88c5eb9eaf0320cda7b0f8ab0825e32e760ee63f1bacdc7dd739255b401a9ca9453ad97367c27817e124e420c4b96b7ac77cf126fd6e9b2b21fc1a5bd66c49e5cacc105e955506567c15aba3d2843090942b78593937d2dca2f0e799719214a5dcd9431e7b6e0739b9af24cb840b0270f883fc69f8726449fcfec59a979002b62bf81bb793a234e752261700d71c2fc182b687018cac500ecd7cf0fd0f8f7d1f1e2ab41af7d51cc43b0de602215c40a0d7f193fef6ab90850d8a80541dc70cd0a8edbf6e73abcb700e652c57743c6b6937a68e79a4f8d03f0688739ab2a7c4a260993b92bce75a2cfe9eb71280f2ce8236612dede344b2d6163a3c5cf32ec6c805b2d28aeaed022655eaa7803c938831862b5965bbb5e45f4b4fdd36db0bbd24514a22176ef4237c15cecb0d0609019f556c0bce3d02721ed052ab49063499031669031a215ea1620a1a3cda0696cda1aed94d359b12fe8d6210d80dc86e363d00e0952976abec862ed767098da3f7fc23b5a2575841dd1730fbbb79533a3b7722cc0d6b5a26d1aab9cb0f5d4870181f6694adc520cd513cc7890b2f6e3ec60b431d2f7fdb77a287056f55b17a85312feec7c0952212def89eec68b8af030187edde7a5a4f86838f7f34dead66cf8b9ce21fb76c1359d257ddf25649d5cd05a1484283d737d0835e0207133d9b6eb5720b2ce479cd2bc770ebef0b0ecf46f091fae84dbac36f71b937c799e10f6f385be75804fa67c3672ebfced278542c6c549000a8569e85ad144f4974b4aedd6a6796cd974f17fc9e37c0c8c041cc0e8056bb427468e3f02d504ef92c616b58a11206e8a5b636295fbeb4b9d98a0bd39455669a78fd38bbe0a63e5abbe033ac9dad4be61fb1d55228c3c05333a724294d3c36fc280a1ad159bf3b141c8032beb402f313f30adaf652f3a7d427e5c99255e2ec76f2421b2624cd51732cdeb49ecf5b36bb7669b6ad534578ec09c6438f2b0e0831e63b032a4b97a7c2b8edc4b274fa0ae94773cdb4d0808d45ce753e6886b695fed64a0e4840257ef4f32d65048e8857cf430f8388de51daf30422cc188dd39cbf47dc4eeaf0027dd2f12d6a0fe6c8828ee7446553f47f43b81cb6a91c40e148a7c677a533337693ec2647b4bf96a3fa1f794d4e6ec5b49cc3e3275b7280cb01d15f543772289dd678db40339a90b7b7e92f57ad95c7448a8a551f8f3121a7c5d9738fa4394fb4a95b3a151d93041a80bfff33b31d1b2bf51b9196ecf0d1eef76dfd8ea5f9cf3e918c6039b125c9a2a942ca660c8cef2911e65d22b4ccc1cb6cf62e15697b585c0ee3ae2d7b963304bc3aac8e5519b486dd2a80f44ceadbcf3bcbe4ed14a334811ddff6966a3b8b4ec4aa893f7de0417b93633b0c27ff2a96c71755a1999f5e894b9ca317e55788ec4b42c4f7185f8408ae8923616c2c10d1a6864e1e87260fe4c030a47fa8fe477c9b5d556aee2ce28eefe58aa1306c97d4a7fce837cae9e373b32166828634b82201ff13dad1788a1168ea35fb14ba60dee57df7b11dd2ccc8bcaf007e9511e58bf8e54a2d80fee2148ce287aa86242b8ba005a4f2c71e4fff0c246c658fc88c08ffc9d4db530b680e837bd48f4189e7951b29169db861316b756ad03f74575867bb8ebd158b4430900751cd2d47327c84e51daaae573adc3e233e48c87b56dfc8b411ad643ec8390c16e76eb9000fec9a9e3438e44a35c0f3e1990ab4a1ea9827b55b7dba3f3d67f5d550861abfb777c24becb5a410d69f7d90afe36ecbdc021daaba222f97ec92055d73816ca93b3975623e84df1d3c2dd67bda67d8003c87468d1df005ccdb6c87d0caf7e80fd30c4fad819958943ac48a51a8d34e54a566a1bdee6fb6ec9b6971b98197a4eb0deb4d21d8492122119d08055c189b00a342b7ad298d7a39fc23a7bbc1d1cc9623e4824b40c19918700160e67d0ff1ba6dedae1988490a46bb9d92b728db1681cfaad5b0c641790e8682fcfaa9c3884ed72ce1b59577640b7d15cd2e58912cb2f42259391be3f487b4e10608e29201c7d8e9336e147557441e7e67c8795ed7fa9dfda4a128a1519e8d7de36850fd8b4d052a6d5a9d68eb026661b50f722ff7a472d88f95b3e922b30f7bf881368a3740885a20041653c1300000b163edd2983a8da76f14d8cf8caaf048a1e90ca1fd03dd3ff6b00fccdaf8d2c30a00fbcfb4c2db0cc312710a05a8015c8967c76061239b22d0fa37c11639d6b657ee8db5fa4e7e3c2db9139009554b24b50e5c997cfb73f9368fe6d06281a6194c9229bd84c71075e83efc4815a149e0e4d85f407acade9f80e0a0aab0c6fbfff045701e405d514194ab02c014f32a2f50b41daa624a3af2acd4c3a012f29997ebe630a5d743afb5125fac469537d845d17d2ed7273d987f1b3e844963f26ac86ee98f8d1826f3648a3913073c75931d8a8c35deeda087a6fd6d7503f45d069b005e3ce03f15359a4597703b214c34d1d620dfb2a44efcda941e52c87467e49f824a4f63d16abc0d3f3eafc4aafb0d3e23efabb64dee1a555b80c13d0d55e4fc5e8957c6a20cf078de2be8f3160fb8c5a4a30bb0709e5a03c11e8f2b4a420ff732d9ede120189b5d6dbdafdbd1edd9534607d2fc80d6509be6e8dc4228f6e850822990c943b835e85c7414c5ed9eae7c9526fa01bdc14f5702052f0115f00dd1b1aecf48504dd72e4d0179f83feb8a86509919bf72e5c4f3ff831bb8acaf5d9be8d24cc2956f368714841ee5c22490a29d47fecba67b8567633ced2780915b8000924ffb6e4a211aca5b001d62d3f3caaeebf881488513a17d12821d4ef81226d4b2674b5fbc4b5c56c3afef127bdf0296aa21c52e1742174fdb0ed5469e6101ff2fb10b6498715614b00147502848eba765dc502baa53f07c54b40608c87a75079d4d83b0ebecbef7832113db9ad2c765af86e313a7365dd27b93d3f67c716ed417d30254e377ea987508b2df59be087869632521a973bb618311710cd2ed8ab634d96a360d7ebfb0bfb768ed183e893a8eca8dcc21f72b986b41eebdc061b97d90f6afc499cd1269740f34aa164d9738780f316ceb70a72884c3903115a2e274de4e130df122f1ad1213250ef7d313a9446bc8bd09686d17fa548066683ddc35c7058393b6f06da65f8403c8ca723f5860d3c9c54de9a1fb6b06b1e45dd3e4101e0a38de99c7a84d7fd29611792863dbf25dc99699aff7311963c1e2ac13cae8c650f908decd5477fb22a30c1fe4337e2e07d948fc188c9598f9653abbf1b7d437f2f5761f0edd298f5cf17c9ce505013d7b3b243891e92c6d871671e236d326a18fc5f849427cf543b7b4202a4e478eb3c9785051be0b08eb3e7d19c3f84153c8cc358fddb7b2fa1047bb6d1a11117a62ea27595063d94071fdc4bed1159d1391546c99bd99d556815f57fe7685065d8841674d1f9d8f31f9a05976ba0e7f7026592f4a0748dd65d860957e0a68e8ea47daceea5e", 0x1000}}, 0x1006) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xa7, 0x1, 0x6, 0x8, 0x0, 0xfff, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x46ab29fc, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x2400, 0x1, 0x80, 0x2, 0x1, 0x5, 0x3, 0x0, 0x2, 0x0, 0x9}, 0x0, 0x3, r1, 0x0) r3 = syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r3, 0x80286722, &(0x7f0000000140)={&(0x7f0000000200)=""/100, 0x64, 0x80000001, 0xf8e7}) 08:30:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000009010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 668.054529] BTRFS error (device loop2): open_ctree failed [ 668.132815] BTRFS error (device loop2): superblock checksum mismatch [ 668.177477] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7483) 08:30:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000600000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 668.218335] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (7487) 08:30:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000400000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 668.265999] BTRFS error (device loop2): open_ctree failed [ 668.280473] BTRFS error (device loop2): superblock checksum mismatch [ 668.299440] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7493) 08:30:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000003480000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x1, 0x6, 0x1, 0x0, 0x5, 0x12420, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0x7e000000000000}, 0x162, 0x1, 0x1, 0x1, 0x0, 0x7, 0x8, 0x0, 0x101, 0x0, 0x8}, 0xffffffffffffffff, 0x4, r0, 0x65ef0cf843947e25) r1 = syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) futimesat(r1, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{}, {0x77359400}}) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x880080, &(0x7f0000000200)=ANY=[@ANYBLOB='nr_inodes=0%0%-5,mode=00000000000000000000200,nr_inodes=6,appraise,obj_user=@.n}{%,fsuuid=f3ac\x00570-7d3\x00-94c\a-5925-a429e77c,fscontext=user_u,dont_measure,\x00']) [ 668.409540] BTRFS error (device loop2): open_ctree failed [ 668.432788] BTRFS error (device loop2): superblock checksum mismatch [ 668.449045] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7493) 08:30:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000010010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 668.545229] BTRFS error (device loop2): open_ctree failed 08:30:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000600000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000500000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000700000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 668.866727] BTRFS error (device loop2): superblock checksum mismatch [ 668.889211] BTRFS error (device loop2): open_ctree failed [ 668.901423] BTRFS error (device loop2): superblock checksum mismatch 08:30:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000023010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 668.912127] BTRFS error (device loop2): open_ctree failed [ 668.921228] BTRFS error (device loop2): superblock checksum mismatch [ 668.928792] BTRFS error (device loop2): open_ctree failed [ 668.937059] BTRFS error (device loop2): superblock checksum mismatch [ 668.944512] BTRFS error (device loop2): open_ctree failed [ 668.954160] BTRFS error (device loop2): superblock checksum mismatch 08:30:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020cdc9b352b4"], 0x191) close(r0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x4, 0x2, 0x7, 0x6, 0x0, 0x4, 0x801, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x7fffffff, 0x3}, 0x500, 0x6, 0x5, 0x4, 0xe5b, 0x4, 0xc, 0x0, 0xfff, 0x0, 0x4}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="f679605c8cb0dfe0de1210e7c52fdd356e150bc10528a90f2169c75695fede817884c7d473bb"]) [ 669.050137] BTRFS error (device loop2): open_ctree failed 08:30:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000800000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000600000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 669.336691] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7603) [ 669.372900] BTRFS error (device loop2): superblock checksum mismatch 08:30:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x80, 0x1, 0x5, 0x7, 0x0, 0x2f, 0x1208, 0x14, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xf26, 0x0, @perf_config_ext={0x100000001, 0x4}, 0x10204, 0x7, 0x2, 0x9, 0x8, 0x7e000, 0x5, 0x0, 0x5, 0x0, 0x400}, 0x0, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x7, 0x6, 0x5, 0x5, 0x0, 0x4, 0x800, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9d, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x5200, 0x10000, 0x1, 0xb, 0x8, 0x8, 0x400, 0x0, 0x33, 0x0, 0x6}, 0xffffffffffffffff, 0xb, r1, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="8f4afcba84b37c80ec"]) 08:30:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000088600000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000b00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 669.487177] BTRFS error (device loop2): open_ctree failed [ 669.493140] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7604) [ 669.518462] BTRFS error (device loop2): superblock checksum mismatch 08:30:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000048010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000700000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 669.624230] BTRFS error (device loop2): open_ctree failed [ 669.632458] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7622) [ 669.657035] BTRFS error (device loop2): superblock checksum mismatch [ 669.742155] BTRFS error (device loop2): open_ctree failed 08:30:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000700000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000002000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000001000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 669.951029] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (7620) [ 669.964289] BTRFS error (device loop2): superblock checksum mismatch 08:30:28 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x2, 0x4, 0x9, 0x0, 0x0, 0x6, 0x3b400, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7cc0, 0x1, @perf_config_ext={0x7, 0x80}, 0x800, 0x8, 0x5, 0x1, 0x400, 0x6, 0x8, 0x0, 0x760d95fb, 0x0, 0x7}, r1, 0x2, r0, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 670.012513] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7639) 08:30:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000004c010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 670.065228] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7658) [ 670.098250] BTRFS error (device loop2): open_ctree failed [ 670.110429] BTRFS error (device loop2): superblock checksum mismatch 08:30:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000003900000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 670.139263] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7670) 08:30:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000800000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 670.284988] BTRFS error (device loop2): open_ctree failed 08:30:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000004800000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 670.325484] BTRFS error (device loop2): superblock checksum mismatch [ 670.335876] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7687) 08:30:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 670.389577] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7690) 08:30:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000c0ed0000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 670.508657] BTRFS error (device loop2): open_ctree failed 08:30:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 670.556308] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7706) [ 670.574057] BTRFS error (device loop2): superblock checksum mismatch [ 670.583239] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7690) 08:30:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000004c00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000068010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 670.694580] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7716) [ 670.729510] BTRFS error (device loop2): open_ctree failed [ 670.738490] BTRFS error (device loop2): superblock checksum mismatch 08:30:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000f00000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000900000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 670.819551] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (7733) 08:30:29 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x22) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x20000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB=' ']) [ 670.953911] BTRFS error (device loop2): open_ctree failed [ 670.984744] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7749) [ 670.999013] BTRFS error (device loop2): superblock checksum mismatch 08:30:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 671.024794] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7753) [ 671.111546] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7759) [ 671.151525] BTRFS error (device loop2): open_ctree failed 08:30:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000a00000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000fff0000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 671.162371] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7749) [ 671.198592] BTRFS error (device loop2): superblock checksum mismatch 08:30:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000006800000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000006c010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 671.414417] BTRFS error (device loop2): open_ctree failed 08:30:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500009ef60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c001000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000006c00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 671.612946] BTRFS error (device loop2): superblock checksum mismatch [ 671.647857] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (7768) [ 671.671600] BTRFS error (device loop2): open_ctree failed [ 671.687397] BTRFS error (device loop2): superblock checksum mismatch 08:30:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$afs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xff, 0x5, &(0x7f0000000440)=[{&(0x7f00000000c0)="895aaa9e3bb64805ece557f987957c7f75da47e74828", 0x16, 0xb5f}, {&(0x7f0000000140)="4ce9078f87fb6b58c38ba7c61d3c91e0723fc3485a8dc26ff8c5f0854682f034243b3ec7f83a24ba16baa2c71e3bd329a301c52240", 0x35, 0x1}, {&(0x7f0000000200)="8a62e2d4ecb0d74b7db4ad7157dde6927747b27846370980374cd9b1249514b40821b4f0da36043015999c4049dca6a26ebd39400af4dc1db3284bf334ad071f29226141ab82940f0ce1df402b825a429349baadedcac6", 0x57, 0x7}, {&(0x7f0000000280)="684f2b06d29941b5fcc7078308912ae5d2116d8a8a74cee65336bb761a3652ae348c13af686000bec103fe63257e6c7f5d6d3131ab814cc3778f0da7e7b6650c99ade9d3a7cb08357187220f75848f5c9ca37ebd6016a5f34cb84b9dedb0928b222e51ea31a3b91e5450d781907c08091654fd9a39924a58d276475d7f8e45b886265b353ef59f3981f995cef816c8477b0ee4141b55dff86eed6f71c6ae4e0409d0293746e1ee72cce7b6d42914842449ce", 0xb2, 0x401}, {&(0x7f0000000340)="3a3d4f66378d5385a997a1bfd86fdac063b372e5ebb728d11fdc00e80fe21f7ccff716004cee2fcfab46998cb880eac97bb71e69ce719ac0af96601f2e81fd00668f901069c75264cc31fba1f5a92bbc77c69b474a6ba9b38c0a06af61eb8f7517430f327e4051c45f60d6f9d05333b8bd145e29d7c01ca3ce1daa6dd2189bd29abe216d9ecea889239e222f12f44408d9a59ef772a355c9677a78947255834980f49755ec6e7d8060ce5b62f0fdc629fff736022c4ac49b20c37510d9a11021a9efb454742499cf530a2750577609500676438d5beb2bbdfbba855d1d37302e9191c6ed235b", 0xe6, 0x8}], 0x100c0, &(0x7f00000004c0)={[{@flock_strict}, {}, {@flock_strict}], [{@hash}, {@obj_user}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x31, 0x65, 0x36, 0x32, 0x33, 0x36, 0x32], 0x2d, [0x37, 0x61, 0x34, 0x34], 0x2d, [0x30, 0x63, 0x63, 0x60], 0x2d, [0x36, 0x61, 0x36, 0x63], 0x2d, [0x64, 0x31, 0x37, 0x31, 0x30, 0x64, 0xf, 0x64]}}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type', 0x3d, 'btrfs\x00'}}, {@uid_lt={'uid<', 0xee01}}]}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000600)={@desc={0x1, 0x0, @auto="114765505fc1ce5c"}}) [ 671.741391] BTRFS error (device loop2): open_ctree failed 08:30:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000007400000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 671.912596] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7834) [ 671.935098] BTRFS error (device loop2): superblock checksum mismatch 08:30:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f0000001b00)=ANY=[@ANYBLOB="50d913da723e44b184c35c67399243"]) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{&(0x7f0000000040)=@ethernet={0x0, @multicast}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/128, 0x80}, {&(0x7f0000000280)=""/209, 0xd1}], 0x2, &(0x7f0000000380)=""/70, 0x46}, 0x5}, {{&(0x7f0000000400)=@ieee802154, 0x80, &(0x7f0000000500)=[{&(0x7f0000000140)=""/56, 0x38}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000600)=""/212, 0xd4}, {&(0x7f0000000700)=""/198, 0xc6}, {&(0x7f0000000800)=""/207, 0xcf}], 0x5}, 0x7fff}, {{&(0x7f0000000900)=@ll, 0x80, &(0x7f0000000580)=[{&(0x7f0000000a00)=""/4096, 0x1000}], 0x1, &(0x7f0000000980)=""/10, 0xa}, 0x860}], 0x4000000000002d9, 0x10000, &(0x7f0000001ac0)={0x77359400}) [ 672.030088] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7813) 08:30:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000074010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c002300000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 672.116385] BTRFS error (device loop2): open_ctree failed [ 672.123808] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7859) [ 672.136366] BTRFS error (device loop2): superblock checksum mismatch 08:30:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 672.200727] BTRFS error (device loop2): open_ctree failed 08:30:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000007a00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500009ff60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 672.356247] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7874) [ 672.369692] BTRFS error (device loop2): superblock checksum mismatch 08:30:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 672.402807] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7880) 08:30:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c002b00000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 672.494271] BTRFS error (device loop2): open_ctree failed 08:30:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00d9e32dc21f082a5f39effd3e1efb4a81e731b80450a285374352eeda333b6c2b080ed6e784d194a76965f51fd269df0cef5c55fe1c0e127cd23c0ed1212858d9da08f05a55972c244bc0b78314221a177dccb799d46530f742ea536b1a442f223f718195211667b0ac1d1a20af734a61449dbd7ac13b69e2cf6c95eadf7651a15f21a5525c2b91aeed964c6caf3a31"]) [ 672.643223] BTRFS error (device loop2): superblock checksum mismatch [ 672.654055] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7897) 08:30:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a0f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 672.703969] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7901) [ 672.733048] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7915) 08:30:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000007a010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 672.789577] BTRFS error (device loop2): open_ctree failed [ 672.802498] BTRFS error (device loop2): superblock checksum mismatch [ 672.833992] BTRFS error (device loop2): open_ctree failed 08:30:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000003000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c004800000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 672.964242] BTRFS error (device loop2): superblock checksum mismatch [ 672.977492] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7931) [ 673.024091] BTRFS error (device loop2): open_ctree failed [ 673.135770] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (7948) [ 673.148210] BTRFS error (device loop2): superblock checksum mismatch 08:30:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a1f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="40000000040000002e2f66696c653000"]) chdir(&(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xfb, 0x67, 0x80, 0x0, 0x0, 0x10001, 0xa0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x10962, 0x2, 0xda5, 0x5, 0x9, 0x3, 0xff, 0x0, 0x151, 0x0, 0x1f}, 0xffffffffffffffff, 0xc, r1, 0x8) quotactl(0x1, &(0x7f0000000240)='./file0\x00', 0xee00, &(0x7f0000000280)="7ba11afd687ff44322971e5f1fcf1b55ceff52eaf9f14202ff106c6a71c2b4189e7a6039e0fd3f4a96fdf9ffecbb8e014d1bfb12a36a93fb71cf48da77c6453ee7592e211010b9af584938f6bc11646ec835e2a23aeed1ea3e8cd0ae06ab1aba597bf9e3891e0b4e6e651881e61e0ebc57464b9f3105198254a09fedb29594b42b192f846a8629e1808a09e810e530042fda473984b56837a37dfef43856cdb08e717a5c1d166107622ba5125f8d10db2c83ac79b46f35755939817ce04cf8ac169bc9259753ce9db0cec52c239f9af6e2df89e7c8665f97085fc41aa71318c68940c1") [ 673.203186] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7943) 08:30:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c004c00000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 673.307664] BTRFS error (device loop2): open_ctree failed [ 673.316887] BTRFS error (device loop2): superblock checksum mismatch [ 673.341337] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (7966) 08:30:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000005000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000030000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 673.369195] BTRFS error (device loop2): open_ctree failed 08:30:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a2f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c006000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 673.531224] BTRFS error (device loop2): superblock checksum mismatch [ 673.551984] BTRFS error (device loop2): open_ctree failed [ 673.582745] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (7990) [ 673.583116] BTRFS error (device loop2): superblock checksum mismatch 08:30:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000006000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 673.644773] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7997) 08:30:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 673.803744] BTRFS error (device loop2): open_ctree failed [ 673.817848] BTRFS error (device loop2): superblock checksum mismatch [ 673.822534] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8007) [ 673.911022] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (7997) 08:30:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000070000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a3f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 674.045233] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (8024) 08:30:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 674.124694] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (8026) 08:30:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000007000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 674.222570] BTRFS error (device loop2): open_ctree failed 08:30:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f0000000240)={0x0, @bt={0x9, 0xfffffff9, 0x0, 0x3, 0x2, 0x80000000, 0x1, 0x4, 0x8, 0x0, 0x6, 0x3, 0x0, 0x7, 0x8, 0x20, {0x10001}, 0x1f, 0x5}}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f0000000a00)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clone(0x10101100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r2 = memfd_create(&(0x7f00000007c0)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@N\xff\x03\x00\x00\x00\x00\x00\x00\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\xf2\aw\xa8\x91\xc5\xb1\xab\x1a\xd8a\xb6=\xee\x16\x9b\x8c\xa7k\n\x86\xc3.\xd5\x9a\xaa\xcd(ovjd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&#FX\xb1\xb6V\x843\b\xb2\xeblh\x99\xd3\xec\xa6\xf7\x91\x9c\x85\xbb\xc3T\xb7\x98\x11\x0f\xa7\x7f\xdf=\x96C\xc8\x84\xf3\xf9\x19\x83\xe31\x90\xd1w2\x12\xf1\xc7\xab)\x80E\xc9\x0f\xc8\aD\x93Xb-?0\x12\x8b\x99+\xec\xca\x9e\xf6\xb2\xcc@\xe6A\xaa\xae\x8a\xc8\x99\x81\x80\xe6\xbc\x1fB\x96\xf1x\xadj\xab\xc0\xf8\x7f&\x13\xf1\x96\x00\x8fS\x8d\xfd\xcad\x19\x03\x91L\x1e\xe9\xd7\x8b\xdd\x8b:\xd3\x97\xa3\x15\x8bH\xf3M\f\x1b4\xc3\xa0\xe6l\xde\xd0\xca*(\x00\x00\x00', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) write(r1, &(0x7f0000000040)="34a2953b2a", 0x5) execveat(r2, &(0x7f0000000700)='\x00', 0x0, 0x0, 0x1000) accept$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, &(0x7f0000000340)=0x10) socket$inet6_sctp(0xa, 0x5, 0x84) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="f10917d7edd6b0cda7bb465dd3fd23185bc1ced91ba9209bd81940bb69076e95c5a64227f49a0bf7c916c8af28e3510829d7f57bdfbf1af2b2c098e33e065e5fe48ec315c81b33817118244822d8246f75c5daaf7b453eca06e90d3a7b9952f7fc52265e2c281c00cb641297be76b40d3e9b4a8463"]) [ 674.271642] BTRFS error (device loop2): superblock checksum mismatch [ 674.291680] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8047) 08:30:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c006800000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 674.322505] BTRFS error (device loop2): open_ctree failed [ 674.333108] BTRFS error (device loop2): superblock checksum mismatch [ 674.361232] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (8059) 08:30:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a4f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000090000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000000b000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 674.513735] BTRFS error (device loop2): open_ctree failed [ 674.540645] BTRFS error (device loop2): superblock checksum mismatch [ 674.548672] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (8089) 08:30:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 674.664368] BTRFS error (device loop2): open_ctree failed [ 674.745510] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8116) [ 674.758636] BTRFS error (device loop2): superblock checksum mismatch [ 674.814314] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (8123) 08:30:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a5f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c006c00000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000001f000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f0000000240)={0x0, @bt={0x9, 0xfffffff9, 0x0, 0x3, 0x2, 0x80000000, 0x1, 0x4, 0x8, 0x0, 0x6, 0x3, 0x0, 0x7, 0x8, 0x20, {0x10001}, 0x1f, 0x5}}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f0000000a00)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clone(0x10101100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r2 = memfd_create(&(0x7f00000007c0)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@N\xff\x03\x00\x00\x00\x00\x00\x00\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\xf2\aw\xa8\x91\xc5\xb1\xab\x1a\xd8a\xb6=\xee\x16\x9b\x8c\xa7k\n\x86\xc3.\xd5\x9a\xaa\xcd(ovjd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&#FX\xb1\xb6V\x843\b\xb2\xeblh\x99\xd3\xec\xa6\xf7\x91\x9c\x85\xbb\xc3T\xb7\x98\x11\x0f\xa7\x7f\xdf=\x96C\xc8\x84\xf3\xf9\x19\x83\xe31\x90\xd1w2\x12\xf1\xc7\xab)\x80E\xc9\x0f\xc8\aD\x93Xb-?0\x12\x8b\x99+\xec\xca\x9e\xf6\xb2\xcc@\xe6A\xaa\xae\x8a\xc8\x99\x81\x80\xe6\xbc\x1fB\x96\xf1x\xadj\xab\xc0\xf8\x7f&\x13\xf1\x96\x00\x8fS\x8d\xfd\xcad\x19\x03\x91L\x1e\xe9\xd7\x8b\xdd\x8b:\xd3\x97\xa3\x15\x8bH\xf3M\f\x1b4\xc3\xa0\xe6l\xde\xd0\xca*(\x00\x00\x00', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) write(r1, &(0x7f0000000040)="34a2953b2a", 0x5) execveat(r2, &(0x7f0000000700)='\x00', 0x0, 0x0, 0x1000) accept$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, &(0x7f0000000340)=0x10) socket$inet6_sctp(0xa, 0x5, 0x84) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="f10917d7edd6b0cda7bb465dd3fd23185bc1ced91ba9209bd81940bb69076e95c5a64227f49a0bf7c916c8af28e3510829d7f57bdfbf1af2b2c098e33e065e5fe48ec315c81b33817118244822d8246f75c5daaf7b453eca06e90d3a7b9952f7fc52265e2c281c00cb641297be76b40d3e9b4a8463"]) [ 674.932106] BTRFS error (device loop2): open_ctree failed [ 674.940356] BTRFS error (device loop2): superblock checksum mismatch 08:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000000a0000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 674.996012] BTRFS error (device loop2): open_ctree failed 08:30:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 675.077605] BTRFS error (device loop2): superblock checksum mismatch [ 675.097229] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (8148) [ 675.206384] BTRFS error (device loop2): open_ctree failed [ 675.237941] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (8164) 08:30:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000020000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 675.252179] BTRFS error (device loop2): superblock checksum mismatch 08:30:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a6f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000bc0)={0x4, 0x80, 0x0, 0x3f, 0x9, 0x3, 0x0, 0x8, 0x80, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000b80), 0x2}, 0xb020, 0x80000000, 0xffffffff, 0x5, 0x800, 0x7, 0xe596, 0x0, 0x684, 0x0, 0x1000}, 0xffffffffffffffff, 0x5, r0, 0x8) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="a78a0465c85f34ab345adbb0f6d3330208359419fd74352bd03bf0155f2c99662b36de1053765dc0bff56be800afa38e6d725548d269bc1d17ef08604b386adb6956ede313d04ca509cd57d82c005f8124a01a0759b625f71cc3158eae23a3033ebe31a729cb655eda", 0x69}, {&(0x7f0000000440)="bf16a01a366168f850d86805db799e89a54f7a532411fecfceafbf64f255e016ef95fbfa90d8ffedec79f7aa66b1feae4ecbc121c78c25532a324c2bd6a7ef8292899c585a1d07a60c7d780cdb599d5c81cfc2a7f79f6fb0a77f81d6d2bced8a748fe72f", 0x64}], 0x2, &(0x7f0000000500)="fa9b4f863820297af37afdcc46368d66e9f94de96c6415eafb49daba63cc43b46684a0020dfcd39fe16c13572e4c642665c2103f55923a4daf4563d9a459de2db35ed5e322c64b89818acc3c9cbba3baa6d2964c655273f2e8667bfc4db58b6a28e284d27c267a97eb126cd53ed34d584257306f49f698e61bc29a064237cf63c2c431326fe175e618ec6045cbb9f75b12a88aa7b2d62bb7c64751ffd16f3aa36feb01572928e0", 0xa7, 0x4040091}, 0x40) sendmsg$tipc(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000001c0)="33be4f55202a93d9ab567b96b1ae2367580539524fa5e4e04f0db980ff05272036ec12799930f141d5c416e19c253178df2a7f99fcd06c7889f923426dc7d2983482782f8c6d6c0d61cc3b2b512d78e2864784634ff73223d247a1158d734438b2f7fc8a86fc7ff072752999171760030ff65bc83cc59744c6e546344cfa5a195d18861e8e4a095241a2b73e41a6aa84", 0x90, 0x10}, 0x4081) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x200042}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@newneigh={0x30, 0x1c, 0x0, 0x70bd25, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x4, 0x6, 0x3}, [@NDA_LINK_NETNSID={0x8, 0xa, 0x80000000}, @NDA_DST_MAC={0xa, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) r2 = dup3(r1, r0, 0x80000) sendmsg$tipc(r2, &(0x7f0000000980)={&(0x7f00000006c0)=@name={0x1e, 0x2, 0x2, {{0x42, 0x2}, 0x2}}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000700)="8f0cb36174c80d6e51989619ae347fe851073401fa45927deec1b7bfe099d31cf1dc39177d4e289f0302fcbfe5b7422a395f1022e84f2a3def581476be1e1f49ae075729135c565fa83f79e1389c", 0x4e}, {&(0x7f0000000780)="e116b65f9de09c9e1e0d9121de4f85b53ceb43ecd62553c89bd591f0597bb271da69", 0x22}, {&(0x7f00000007c0)="474f56e2321dba0b74199a71e7bd9c789ebcbcecebebe491dbdca80646255e11b7ba91c4de2268b044695453ab08fc5faea23957f34458747fc58f04cf09583ef4868b25b6391b2bd606f2674b", 0x4d}, {&(0x7f0000000840)="e2cf396b1fffc47baff1326d157035a75fef2c3e83e4a682905d88d0aebb72f91e6f9db770bfad0ddef3ae5e5ef79b21dc020148cb12458348536c431bb23f78ea2d80d003844d78ef4e443ac8f0493fd959deee679404955d934ce354c87011ada570d4d6bc29a0a3585cb1800b3baade664d09a3ed12b86ba2c7c53dd44b51682520292e21186d4cafa9488787ea21d92aa900cb61f841f14fcc787d3e5e15af49e1159456cc8b00bcac7295e5048795af4dfe530ac3ff353882552a622e560b6230bff2", 0xc5}, {&(0x7f0000000a00)="9e3ed7dd49d836518f728b01828d77c90828f25e09ac8a6029e5ea9cf4b3bf15fea88f19aee45dd32a31afb445328309d6fbc9eb7bf2486a63b05bdce4d96e518a96ba1b6e82bab0a565ec534595752f06e676804002217e6959b10ae3efced91b4cc5e922059843790f33db5cd99f2d009dbaff1622d89a39f09d60303d4c078be0db978391c97c206750bd2572b372cfd957a90a168a2604911698536af1883433e923e54c002c3f7d91dfdf27d4d7dfe8e6ba76d9c1fbdbd1ab92bc09adbdd3e8202bffac0a55bf2da32401861075bbdbbb5da9fb4ff88f2bc33f1a79967729425700797883f1939d0a98d575f0a0a8f298e58a", 0xf5}, {&(0x7f0000000940)="2698b249be38c105296f97927813b25994fabb4436b1870f3e4c462f065c358db137b204e2bb2a855b2a0a09", 0x2c}], 0x6}, 0xc084) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020cdc9b352b4"], 0x191) close(r3) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000680)={'tunl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x80, 0x20, 0x7, 0x0, {{0x5, 0x4, 0x2, 0x1, 0x14, 0x68, 0x0, 0x3f, 0x29, 0x0, @multicast2, @loopback}}}}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) [ 675.342864] BTRFS error (device loop2): open_ctree failed [ 675.368339] BTRFS error (device loop2): superblock checksum mismatch 08:30:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c007400000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 675.417818] BTRFS error (device loop2): open_ctree failed 08:30:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000000b0000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 675.530242] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8191) [ 675.550235] BTRFS error (device loop2): superblock checksum mismatch [ 675.665237] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (8197) [ 675.692315] BTRFS error (device loop2): open_ctree failed [ 675.692716] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (8208) 08:30:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a7f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 675.710819] BTRFS error (device loop2): superblock checksum mismatch 08:30:34 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000bc0)={0x4, 0x80, 0x0, 0x3f, 0x9, 0x3, 0x0, 0x8, 0x80, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000b80), 0x2}, 0xb020, 0x80000000, 0xffffffff, 0x5, 0x800, 0x7, 0xe596, 0x0, 0x684, 0x0, 0x1000}, 0xffffffffffffffff, 0x5, r0, 0x8) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="a78a0465c85f34ab345adbb0f6d3330208359419fd74352bd03bf0155f2c99662b36de1053765dc0bff56be800afa38e6d725548d269bc1d17ef08604b386adb6956ede313d04ca509cd57d82c005f8124a01a0759b625f71cc3158eae23a3033ebe31a729cb655eda", 0x69}, {&(0x7f0000000440)="bf16a01a366168f850d86805db799e89a54f7a532411fecfceafbf64f255e016ef95fbfa90d8ffedec79f7aa66b1feae4ecbc121c78c25532a324c2bd6a7ef8292899c585a1d07a60c7d780cdb599d5c81cfc2a7f79f6fb0a77f81d6d2bced8a748fe72f", 0x64}], 0x2, &(0x7f0000000500)="fa9b4f863820297af37afdcc46368d66e9f94de96c6415eafb49daba63cc43b46684a0020dfcd39fe16c13572e4c642665c2103f55923a4daf4563d9a459de2db35ed5e322c64b89818acc3c9cbba3baa6d2964c655273f2e8667bfc4db58b6a28e284d27c267a97eb126cd53ed34d584257306f49f698e61bc29a064237cf63c2c431326fe175e618ec6045cbb9f75b12a88aa7b2d62bb7c64751ffd16f3aa36feb01572928e0", 0xa7, 0x4040091}, 0x40) sendmsg$tipc(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000001c0)="33be4f55202a93d9ab567b96b1ae2367580539524fa5e4e04f0db980ff05272036ec12799930f141d5c416e19c253178df2a7f99fcd06c7889f923426dc7d2983482782f8c6d6c0d61cc3b2b512d78e2864784634ff73223d247a1158d734438b2f7fc8a86fc7ff072752999171760030ff65bc83cc59744c6e546344cfa5a195d18861e8e4a095241a2b73e41a6aa84", 0x90, 0x10}, 0x4081) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x200042}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@newneigh={0x30, 0x1c, 0x0, 0x70bd25, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x4, 0x6, 0x3}, [@NDA_LINK_NETNSID={0x8, 0xa, 0x80000000}, @NDA_DST_MAC={0xa, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) r2 = dup3(r1, r0, 0x80000) sendmsg$tipc(r2, &(0x7f0000000980)={&(0x7f00000006c0)=@name={0x1e, 0x2, 0x2, {{0x42, 0x2}, 0x2}}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000700)="8f0cb36174c80d6e51989619ae347fe851073401fa45927deec1b7bfe099d31cf1dc39177d4e289f0302fcbfe5b7422a395f1022e84f2a3def581476be1e1f49ae075729135c565fa83f79e1389c", 0x4e}, {&(0x7f0000000780)="e116b65f9de09c9e1e0d9121de4f85b53ceb43ecd62553c89bd591f0597bb271da69", 0x22}, {&(0x7f00000007c0)="474f56e2321dba0b74199a71e7bd9c789ebcbcecebebe491dbdca80646255e11b7ba91c4de2268b044695453ab08fc5faea23957f34458747fc58f04cf09583ef4868b25b6391b2bd606f2674b", 0x4d}, {&(0x7f0000000840)="e2cf396b1fffc47baff1326d157035a75fef2c3e83e4a682905d88d0aebb72f91e6f9db770bfad0ddef3ae5e5ef79b21dc020148cb12458348536c431bb23f78ea2d80d003844d78ef4e443ac8f0493fd959deee679404955d934ce354c87011ada570d4d6bc29a0a3585cb1800b3baade664d09a3ed12b86ba2c7c53dd44b51682520292e21186d4cafa9488787ea21d92aa900cb61f841f14fcc787d3e5e15af49e1159456cc8b00bcac7295e5048795af4dfe530ac3ff353882552a622e560b6230bff2", 0xc5}, {&(0x7f0000000a00)="9e3ed7dd49d836518f728b01828d77c90828f25e09ac8a6029e5ea9cf4b3bf15fea88f19aee45dd32a31afb445328309d6fbc9eb7bf2486a63b05bdce4d96e518a96ba1b6e82bab0a565ec534595752f06e676804002217e6959b10ae3efced91b4cc5e922059843790f33db5cd99f2d009dbaff1622d89a39f09d60303d4c078be0db978391c97c206750bd2572b372cfd957a90a168a2604911698536af1883433e923e54c002c3f7d91dfdf27d4d7dfe8e6ba76d9c1fbdbd1ab92bc09adbdd3e8202bffac0a55bf2da32401861075bbdbbb5da9fb4ff88f2bc33f1a79967729425700797883f1939d0a98d575f0a0a8f298e58a", 0xf5}, {&(0x7f0000000940)="2698b249be38c105296f97927813b25994fabb4436b1870f3e4c462f065c358db137b204e2bb2a855b2a0a09", 0x2c}], 0x6}, 0xc084) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020cdc9b352b4"], 0x191) close(r3) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000680)={'tunl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x80, 0x20, 0x7, 0x0, {{0x5, 0x4, 0x2, 0x1, 0x14, 0x68, 0x0, 0x3f, 0x29, 0x0, @multicast2, @loopback}}}}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) 08:30:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c007a00000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 675.803777] BTRFS error (device loop2): open_ctree failed [ 675.837271] BTRFS error (device loop2): superblock checksum mismatch 08:30:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000003f000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 675.850486] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8229) [ 675.954120] BTRFS error (device loop2): open_ctree failed 08:30:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a8f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000090000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 676.143669] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (8247) [ 676.161644] BTRFS error (device loop2): superblock checksum mismatch 08:30:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000003000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 676.238316] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (8221) 08:30:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000000f0000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 676.287647] BTRFS error (device loop2): open_ctree failed [ 676.294571] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (8270) [ 676.316025] BTRFS error (device loop2): superblock checksum mismatch [ 676.423831] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8269) 08:30:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000017400ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000048000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 676.586642] BTRFS error (device loop2): open_ctree failed [ 676.600517] BTRFS error (device loop2): superblock checksum mismatch [ 676.617609] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (8290) 08:30:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000a9f60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000216405f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 676.736556] BTRFS error (device loop2): open_ctree failed 08:30:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000130000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000005000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c001000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 676.955175] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8309) [ 676.974326] BTRFS error (device loop2): superblock checksum mismatch [ 677.010252] BTRFS error (device loop2): open_ctree failed [ 677.021063] BTRFS error (device loop2): superblock checksum mismatch 08:30:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000aaf60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 677.059315] BTRFS error (device loop2): open_ctree failed [ 677.080298] BTRFS error (device loop2): superblock checksum mismatch 08:30:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 677.111750] BTRFS error (device loop2): open_ctree failed 08:30:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000004c000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000140000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000abf60100010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000006000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000001f0000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000068000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000200010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500002b000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000007000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000001f0000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000006c000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000400010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000009000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000200000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 678.324321] BTRFS: device fsid f90dac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 0 transid 0 /dev/loop0 08:30:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000074000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000fffffdfd5f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000001000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000a000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000007a000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 678.689021] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (8463) 08:30:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000003f0000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 678.773751] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (8490) 08:30:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00001f000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000ffff1f00010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000fdef000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000630000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000020000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000fcfdffff5f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000f000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000effd000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 679.374534] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (8554) [ 679.421870] BTRFS error (device loop2): superblock checksum mismatch [ 679.467666] BTRFS error (device loop2): open_ctree failed [ 679.494531] BTRFS error (device loop2): superblock checksum mismatch 08:30:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000023000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 679.508346] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8571) [ 679.534888] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (8570) 08:30:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000001010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 679.713349] BTRFS error (device loop2): open_ctree failed 08:30:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000040800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000020000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 679.841840] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8596) [ 679.856031] BTRFS error (device loop2): superblock checksum mismatch 08:30:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 680.018391] BTRFS error (device loop2): open_ctree failed 08:30:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000002010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000030000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00002b000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000900000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000003010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 680.446188] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (8645) [ 680.460473] BTRFS error (device loop2): superblock checksum mismatch [ 680.494564] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (8648) 08:30:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000040000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00003f000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 680.619001] BTRFS error (device loop2): open_ctree failed [ 680.628969] BTRFS error (device loop2): superblock checksum mismatch [ 680.656606] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8671) 08:30:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000a00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 680.684941] BTRFS error (device loop2): open_ctree failed [ 680.711428] BTRFS error (device loop2): superblock checksum mismatch 08:30:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000004010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000feffffff5f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 680.805987] BTRFS error (device loop2): open_ctree failed 08:30:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000b00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000070000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000040000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000005010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 681.150158] BTRFS error (device loop2): superblock checksum mismatch [ 681.169054] BTRFS error (device loop2): open_ctree failed [ 681.199311] BTRFS error (device loop2): superblock checksum mismatch [ 681.216354] BTRFS error (device loop2): open_ctree failed 08:30:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 681.265608] BTRFS error (device loop2): superblock checksum mismatch 08:30:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 681.342644] BTRFS error (device loop2): open_ctree failed [ 681.371503] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8739) [ 681.377224] BTRFS error (device loop2): superblock checksum mismatch 08:30:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000c00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000300005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 681.519511] BTRFS error (device loop2): open_ctree failed 08:30:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000006010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000080000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 681.709820] BTRFS error (device loop2): superblock checksum mismatch [ 681.732074] BTRFS error (device loop2): open_ctree failed 08:30:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000048000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 681.758766] BTRFS error (device loop2): superblock checksum mismatch 08:30:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000d00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 681.847872] BTRFS error (device loop2): open_ctree failed 08:30:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000007010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 681.995903] BTRFS error (device loop2): superblock checksum mismatch [ 682.005567] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (8807) 08:30:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 682.143263] BTRFS error (device loop2): open_ctree failed 08:30:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000e00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000008010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000090000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00004c000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 682.439077] BTRFS error (device loop2): superblock checksum mismatch [ 682.461081] BTRFS error (device loop2): open_ctree failed [ 682.481518] BTRFS error (device loop2): superblock checksum mismatch [ 682.537261] BTRFS error (device loop2): open_ctree failed [ 682.548122] BTRFS error (device loop2): superblock checksum mismatch [ 682.566389] BTRFS error (device loop2): open_ctree failed 08:30:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 682.591916] BTRFS error (device loop2): superblock checksum mismatch 08:30:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000500005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 682.773323] BTRFS error (device loop2): open_ctree failed [ 682.804760] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (8854) 08:30:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000000a0000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 682.822398] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (8879) [ 682.844638] BTRFS error (device loop2): superblock checksum mismatch 08:30:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000060000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 682.990009] BTRFS error (device loop2): open_ctree failed [ 683.013587] BTRFS error (device loop2): superblock checksum mismatch 08:30:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000009010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 683.074951] BTRFS error (device loop2): open_ctree failed 08:30:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 683.231512] BTRFS error (device loop2): superblock checksum mismatch [ 683.258980] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (8923) [ 683.315120] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (8922) 08:30:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000010010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 683.368646] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (8924) 08:30:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001100000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000000b0000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 683.453579] BTRFS error (device loop2): open_ctree failed [ 683.461067] BTRFS error (device loop2): superblock checksum mismatch 08:30:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000068000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 683.633432] BTRFS error (device loop2): open_ctree failed 08:30:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001200000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 683.854617] BTRFS error (device loop2): superblock checksum mismatch [ 683.913274] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (8973) 08:30:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00006c000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 684.053824] BTRFS error (device loop2): open_ctree failed [ 684.062068] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (8961) [ 684.079025] BTRFS error (device loop2): superblock checksum mismatch 08:30:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000bd11ac18010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000000f0000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 684.249823] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (8992) 08:30:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 684.355411] BTRFS error (device loop2): open_ctree failed 08:30:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 08:30:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000001f010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 684.427623] BTRFS error (device loop2): superblock checksum mismatch [ 684.452622] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9019) [ 684.516979] BTRFS error (device loop2): open_ctree failed 08:30:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 08:30:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000074000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000100000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 684.680597] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9044) [ 684.693531] BTRFS error (device loop2): superblock checksum mismatch [ 684.743035] BTRFS error (device loop2): open_ctree failed [ 684.761417] BTRFS error (device loop2): superblock checksum mismatch 08:30:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000020010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 08:30:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000002000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 684.841860] BTRFS error (device loop2): open_ctree failed [ 684.849715] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9071) [ 684.863627] BTRFS error (device loop2): superblock checksum mismatch 08:30:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000b00005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 685.014003] BTRFS error (device loop2): open_ctree failed 08:30:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00007a000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 685.084828] BTRFS error (device loop2): superblock checksum mismatch [ 685.114070] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9084) [ 685.142710] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9071) 08:30:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000023010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000130000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 685.239835] BTRFS error (device loop2): open_ctree failed [ 685.249431] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9111) [ 685.271166] BTRFS error (device loop2): superblock checksum mismatch 08:30:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00c0ed000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 685.424640] BTRFS error (device loop2): open_ctree failed 08:30:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000003f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000003f010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f00000005c0)) [ 685.666188] BTRFS error (device loop2): superblock checksum mismatch [ 685.678100] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9134) 08:30:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000fff000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 685.749130] BTRFS error (device loop2): open_ctree failed [ 685.757280] BTRFS error (device loop2): superblock checksum mismatch [ 685.765994] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (9146) 08:30:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000004000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 685.933098] BTRFS error (device loop2): open_ctree failed 08:30:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000140000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 686.034719] BTRFS error (device loop2): superblock checksum mismatch 08:30:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f00000005c0)) [ 686.076272] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9172) [ 686.114788] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (9173) 08:30:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000020000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000079f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 686.224724] BTRFS error (device loop2): open_ctree failed [ 686.334713] BTRFS error (device loop2): superblock checksum mismatch [ 686.354453] BTRFS error (device loop2): open_ctree failed [ 686.364279] BTRFS error (device loop2): superblock checksum mismatch 08:30:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000348010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f00000005c0)) 08:30:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000630000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 686.394515] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9207) [ 686.520759] BTRFS error (device loop2): open_ctree failed [ 686.545923] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9225) [ 686.558114] BTRFS error (device loop2): superblock checksum mismatch 08:30:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000040000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 686.573591] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9227) 08:30:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000005005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000060010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000005c0)) [ 686.773174] BTRFS error (device loop2): open_ctree failed [ 686.796655] BTRFS error (device loop2): superblock checksum mismatch [ 686.803741] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9251) 08:30:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000000007ad00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 686.893638] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9227) [ 686.915776] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.921417] ieee802154 phy1 wpan1: encryption failed: -22 08:30:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000000300ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 686.953004] BTRFS error (device loop2): open_ctree failed [ 686.972219] BTRFS error (device loop2): superblock checksum mismatch 08:30:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000070010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000005c0)) [ 687.069323] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (9274) 08:30:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000100000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 687.183121] BTRFS error (device loop2): open_ctree failed 08:30:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00ffff1f0000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000000007f200000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000003500ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 687.485050] BTRFS error (device loop2): superblock checksum mismatch [ 687.532975] BTRFS error (device loop2): open_ctree failed 08:30:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000006088010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000000b700ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000002000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000400000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000005c0)) [ 687.841471] BTRFS error (device loop2): superblock checksum mismatch [ 687.870399] BTRFS error (device loop2): open_ctree failed 08:30:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000ffffff8c010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 687.911361] BTRFS error (device loop2): superblock checksum mismatch [ 687.926713] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9350) [ 688.036618] BTRFS error (device loop2): open_ctree failed [ 688.049318] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9360) [ 688.069207] BTRFS error (device loop2): superblock checksum mismatch [ 688.158969] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9350) 08:30:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000100000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010200ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100000000000b005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 688.274416] BTRFS error (device loop2): open_ctree failed 08:30:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000003000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000390010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000005c0)) [ 688.535444] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9395) [ 688.548130] BTRFS error (device loop2): superblock checksum mismatch [ 688.581100] BTRFS error (device loop2): open_ctree failed [ 688.609297] BTRFS error (device loop2): superblock checksum mismatch 08:30:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000200000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 688.632188] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9410) [ 688.777345] BTRFS error (device loop2): open_ctree failed 08:30:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000ffffff97010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b", 0x24, 0x10000}], 0x0, &(0x7f00000005c0)) [ 688.836341] BTRFS error (device loop2): superblock checksum mismatch 08:30:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 688.938128] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9396) 08:30:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010300ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 689.022946] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9426) 08:30:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b", 0x24, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000300000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 689.156473] BTRFS error (device loop2): open_ctree failed [ 689.187678] BTRFS error (device loop2): superblock checksum mismatch 08:30:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000004000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 689.274235] BTRFS error (device loop2): open_ctree failed 08:30:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f69e010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 689.383855] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9467) [ 689.418160] BTRFS error (device loop2): superblock checksum mismatch [ 689.510951] BTRFS error (device loop2): open_ctree failed [ 689.534492] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (9482) 08:30:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b", 0x24, 0x10000}], 0x0, &(0x7f00000005c0)) [ 689.563136] BTRFS error (device loop2): superblock checksum mismatch 08:30:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000400000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 689.614283] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9487) 08:30:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000005000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010400ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 689.717787] BTRFS error (device loop2): open_ctree failed 08:30:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f69f010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 689.764467] BTRFS error (device loop2): superblock checksum mismatch 08:30:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 689.835161] BTRFS error (device loop2): open_ctree failed 08:30:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000500000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000006000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 690.002103] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9524) [ 690.020453] BTRFS error (device loop2): superblock checksum mismatch 08:30:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a0010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010500ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 690.112714] BTRFS error (device loop2): open_ctree failed [ 690.121120] BTRFS error (device loop2): superblock checksum mismatch [ 690.133123] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9542) [ 690.246700] BTRFS error (device loop2): open_ctree failed 08:30:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000600000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 690.319389] BTRFS error (device loop2): superblock checksum mismatch [ 690.353053] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9556) 08:30:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a1010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 690.446957] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9558) [ 690.514479] BTRFS error (device loop2): open_ctree failed [ 690.525352] BTRFS error (device loop2): superblock checksum mismatch [ 690.528521] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9579) [ 690.584412] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9558) 08:30:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000007000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000700000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 690.758206] BTRFS error (device loop2): open_ctree failed [ 690.787860] BTRFS error (device loop2): superblock checksum mismatch 08:30:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010600ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 690.862906] BTRFS error (device loop2): open_ctree failed [ 691.023033] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9611) [ 691.023604] BTRFS error (device loop2): superblock checksum mismatch [ 691.054179] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9622) 08:30:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a2010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000800000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 691.148397] BTRFS error (device loop2): open_ctree failed [ 691.156673] BTRFS error (device loop2): superblock checksum mismatch 08:30:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000008000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 691.252935] BTRFS error (device loop2): open_ctree failed [ 691.304478] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9622) 08:30:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010700ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a3010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 691.419008] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9652) [ 691.433049] BTRFS error (device loop2): superblock checksum mismatch [ 691.648985] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (9660) 08:30:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000900000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000000b000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 691.732940] BTRFS error (device loop2): open_ctree failed 08:30:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a4010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 692.030284] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9684) [ 692.063262] BTRFS error (device loop2): superblock checksum mismatch 08:30:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000a00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 692.108172] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9677) 08:30:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010800ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000010000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 692.283304] BTRFS error (device loop2): open_ctree failed [ 692.291847] BTRFS error (device loop2): superblock checksum mismatch [ 692.321802] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9716) 08:30:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000048000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000001000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 692.407303] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9712) 08:30:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a5010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 692.534125] BTRFS error (device loop2): open_ctree failed [ 692.565641] BTRFS error (device loop2): superblock checksum mismatch [ 692.614142] BTRFS error (device loop2): open_ctree failed [ 692.631588] BTRFS error (device loop2): superblock checksum mismatch [ 692.650223] BTRFS error (device loop2): open_ctree failed [ 692.660538] BTRFS error (device loop2): superblock checksum mismatch 08:30:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000005005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 692.686701] BTRFS error (device loop2): open_ctree failed 08:30:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000004c000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010900ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00bd11ac1800000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 693.035061] BTRFS error (device loop2): superblock checksum mismatch [ 693.048876] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (9782) [ 693.074960] BTRFS error (device loop2): open_ctree failed [ 693.085160] BTRFS error (device loop2): superblock checksum mismatch [ 693.085398] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9793) 08:30:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000068000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a6010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 693.213019] BTRFS error (device loop2): open_ctree failed [ 693.227085] BTRFS error (device loop2): superblock checksum mismatch [ 693.244679] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9793) 08:30:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000011000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 693.395959] BTRFS error (device loop2): open_ctree failed 08:30:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000001f00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a7010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 693.498561] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9839) [ 693.510726] BTRFS error (device loop2): superblock checksum mismatch 08:30:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000005c0)) [ 693.574175] BTRFS error (device loop2): open_ctree failed [ 693.588800] BTRFS error (device loop2): superblock checksum mismatch [ 693.597071] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9850) 08:30:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000002000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000006c000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 693.727070] BTRFS error (device loop2): open_ctree failed 08:30:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000012300ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000005c0)) [ 693.861263] BTRFS error (device loop2): superblock checksum mismatch [ 693.887183] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9876) [ 693.965265] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (9877) 08:30:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000002300000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 694.016138] BTRFS error (device loop2): open_ctree failed [ 694.022038] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9890) [ 694.048939] BTRFS error (device loop2): superblock checksum mismatch 08:30:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000074000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 694.204018] BTRFS error (device loop2): open_ctree failed 08:30:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a8010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 694.312624] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9890) [ 694.343941] BTRFS error (device loop2): superblock checksum mismatch 08:30:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000014800ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 694.388685] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (9914) [ 694.552819] BTRFS error (device loop2): open_ctree failed 08:30:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000007a000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 694.608713] BTRFS error (device loop2): superblock checksum mismatch 08:30:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000002b00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 694.715005] BTRFS error (device loop2): open_ctree failed 08:30:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6a9010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000005c0)) [ 694.829015] BTRFS error (device loop2): superblock checksum mismatch [ 694.863290] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (9965) [ 694.883996] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (9940) 08:30:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000003f00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000030800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000014c00ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 694.937324] BTRFS error (device loop2): open_ctree failed [ 694.963324] BTRFS error (device loop2): superblock checksum mismatch [ 695.028430] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (9984) 08:30:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000050800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000005c0)) 08:30:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6aa010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 695.185930] BTRFS error (device loop2): open_ctree failed [ 695.197343] BTRFS error (device loop2): superblock checksum mismatch [ 695.216783] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10006) 08:30:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000005c0)) 08:30:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000060800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 695.373453] BTRFS error (device loop2): open_ctree failed 08:30:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000004800000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 695.487247] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10006) [ 695.506501] BTRFS error (device loop2): superblock checksum mismatch 08:30:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000016800ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 695.608345] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (10046) 08:30:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000070800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 695.654126] BTRFS error (device loop2): open_ctree failed [ 695.663055] BTRFS error (device loop2): superblock checksum mismatch [ 695.683808] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10055) 08:30:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000001f6ab010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 695.756304] BTRFS error (device loop2): open_ctree failed 08:30:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:30:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000004c00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 695.910155] BTRFS error (device loop2): superblock checksum mismatch [ 695.938876] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (10077) 08:30:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:30:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000000b0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 696.069517] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10081) [ 696.136004] BTRFS error (device loop2): open_ctree failed [ 696.147312] BTRFS error (device loop2): superblock checksum mismatch [ 696.178861] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10100) 08:30:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000018ac11bd010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 696.238222] BTRFS error (device loop2): open_ctree failed 08:30:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000016c00ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000400f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000006000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 696.538316] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10124) [ 696.558411] BTRFS error (device loop2): superblock checksum mismatch [ 696.567779] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10139) 08:30:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000006800000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000edc0010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 696.608076] BTRFS error (device loop2): open_ctree failed [ 696.630218] BTRFS error (device loop2): superblock checksum mismatch 08:30:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000001f0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 696.694035] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (10146) [ 696.718915] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10145) [ 696.837644] BTRFS error (device loop2): open_ctree failed 08:30:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000ffffffe4010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000017400ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000006c00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 697.079823] BTRFS error (device loop2): superblock checksum mismatch [ 697.102359] BTRFS warning (device ): duplicate device /dev/loop0 devid 1 generation 7 scanned by syz-executor.0 (10180) [ 697.131512] BTRFS error (device loop2): open_ctree failed [ 697.142668] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10186) [ 697.169639] BTRFS error (device loop2): superblock checksum mismatch [ 697.252654] BTRFS error (device loop2): open_ctree failed [ 697.282702] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10199) [ 697.302842] BTRFS error (device loop2): superblock checksum mismatch 08:30:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000200800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000fffffff5010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000edc000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000007400000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 697.374360] BTRFS error (device loop2): open_ctree failed 08:30:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000003f0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 697.595555] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10197) [ 697.612548] BTRFS error (device loop2): superblock checksum mismatch 08:30:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000017a00ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 697.691545] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (10220) [ 697.711592] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10229) 08:30:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000b00010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 697.748690] BTRFS error (device loop2): open_ctree failed [ 697.754671] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (10244) [ 697.769035] BTRFS error (device loop2): superblock checksum mismatch 08:30:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000480800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000fffffff6010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 698.025612] BTRFS error (device loop2): open_ctree failed [ 698.057625] BTRFS error (device loop2): superblock checksum mismatch 08:30:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000007a00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 698.069435] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (10262) 08:30:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 698.182832] BTRFS error (device loop2): open_ctree failed 08:30:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000800000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 698.291882] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10273) [ 698.297805] BTRFS error (device loop2): superblock checksum mismatch [ 698.320703] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10278) 08:30:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000fffffffd010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00ffffff8c00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 698.378528] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10255) 08:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010003ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 698.455925] BTRFS error (device loop2): open_ctree failed [ 698.482923] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (10296) [ 698.507149] BTRFS error (device loop2): superblock checksum mismatch 08:30:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000004c0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000006c00010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 698.601798] BTRFS error (device loop2): open_ctree failed [ 698.610065] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10304) [ 698.622857] BTRFS error (device loop2): superblock checksum mismatch 08:30:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00ffffff9700000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 698.722806] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10310) [ 698.793417] BTRFS error (device loop2): open_ctree failed 08:30:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 1) 08:30:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000fffffffe010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 698.979624] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10339) [ 698.985707] FAULT_INJECTION: forcing a failure. [ 698.985707] name failslab, interval 1, probability 0, space 0, times 0 [ 699.007452] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10310) [ 699.030626] BTRFS error (device loop2): superblock checksum mismatch [ 699.043628] CPU: 1 PID: 10353 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 699.051528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.060887] Call Trace: [ 699.063491] dump_stack+0x1fc/0x2ef [ 699.067136] should_fail.cold+0xa/0xf [ 699.070951] ? setup_fault_attr+0x200/0x200 [ 699.075285] ? lock_acquire+0x170/0x3c0 [ 699.079262] __should_failslab+0x115/0x180 [ 699.083641] should_failslab+0x5/0x10 [ 699.087452] __kmalloc+0x2ab/0x3c0 [ 699.090989] ? __se_sys_memfd_create+0xf8/0x440 [ 699.095670] __se_sys_memfd_create+0xf8/0x440 [ 699.100174] ? memfd_file_seals_ptr+0x150/0x150 [ 699.104848] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.110220] ? trace_hardirqs_off_caller+0x6e/0x210 [ 699.115245] ? do_syscall_64+0x21/0x620 [ 699.119219] do_syscall_64+0xf9/0x620 [ 699.123040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.128258] RIP: 0033:0x7f9963486ae9 [ 699.131961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.150966] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 699.158686] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963486ae9 [ 699.165957] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f99634e00fb [ 699.173237] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff 08:30:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 2) [ 699.180821] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 699.188081] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 [ 699.223244] BTRFS error (device loop2): open_ctree failed [ 699.231572] BTRFS error (device loop2): superblock checksum mismatch 08:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010005ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0018ac11bd00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000680800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 699.298035] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10358) [ 699.321775] FAULT_INJECTION: forcing a failure. [ 699.321775] name failslab, interval 1, probability 0, space 0, times 0 [ 699.356247] CPU: 1 PID: 10366 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 699.364246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.373617] Call Trace: [ 699.376201] dump_stack+0x1fc/0x2ef [ 699.379899] should_fail.cold+0xa/0xf [ 699.383701] ? setup_fault_attr+0x200/0x200 [ 699.388021] ? lock_acquire+0x170/0x3c0 [ 699.391995] __should_failslab+0x115/0x180 [ 699.396223] should_failslab+0x5/0x10 [ 699.400014] kmem_cache_alloc+0x277/0x370 [ 699.404160] ? shmem_destroy_callback+0xb0/0xb0 [ 699.408821] shmem_alloc_inode+0x18/0x40 [ 699.412872] ? shmem_destroy_callback+0xb0/0xb0 [ 699.417535] alloc_inode+0x5d/0x180 [ 699.421164] new_inode+0x1d/0xf0 [ 699.424542] shmem_get_inode+0x96/0x8d0 [ 699.428517] __shmem_file_setup.part.0+0x7a/0x2b0 [ 699.433358] shmem_file_setup+0x61/0x90 [ 699.437341] __se_sys_memfd_create+0x26b/0x440 [ 699.441917] ? memfd_file_seals_ptr+0x150/0x150 [ 699.446703] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.452239] ? trace_hardirqs_off_caller+0x6e/0x210 [ 699.457267] ? do_syscall_64+0x21/0x620 [ 699.461236] do_syscall_64+0xf9/0x620 [ 699.465045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.470245] RIP: 0033:0x7f9963486ae9 [ 699.473959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.492962] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 699.500662] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963486ae9 [ 699.507922] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f99634e00fb [ 699.515185] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 699.522442] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 699.529699] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 08:30:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 3) [ 699.587119] BTRFS error (device loop2): open_ctree failed [ 699.603809] BTRFS error (device loop2): superblock checksum mismatch [ 699.652671] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10371) 08:30:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000fff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 699.723708] BTRFS error (device loop2): open_ctree failed [ 699.726957] FAULT_INJECTION: forcing a failure. [ 699.726957] name failslab, interval 1, probability 0, space 0, times 0 [ 699.742031] CPU: 1 PID: 10390 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 699.749920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.759447] Call Trace: [ 699.762028] dump_stack+0x1fc/0x2ef [ 699.765659] should_fail.cold+0xa/0xf [ 699.769469] ? setup_fault_attr+0x200/0x200 [ 699.773794] ? lock_acquire+0x170/0x3c0 [ 699.777870] __should_failslab+0x115/0x180 [ 699.782102] should_failslab+0x5/0x10 [ 699.785895] kmem_cache_alloc+0x277/0x370 [ 699.790053] __d_alloc+0x2b/0xa10 [ 699.793528] d_alloc_pseudo+0x19/0x70 [ 699.797322] alloc_file_pseudo+0xc6/0x250 [ 699.801482] ? alloc_file+0x4d0/0x4d0 [ 699.805284] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 699.810905] ? shmem_get_inode+0x44c/0x8d0 [ 699.815155] __shmem_file_setup.part.0+0x102/0x2b0 [ 699.820095] shmem_file_setup+0x61/0x90 [ 699.824070] __se_sys_memfd_create+0x26b/0x440 [ 699.828648] ? memfd_file_seals_ptr+0x150/0x150 [ 699.833312] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.838670] ? trace_hardirqs_off_caller+0x6e/0x210 [ 699.843688] ? do_syscall_64+0x21/0x620 [ 699.847664] do_syscall_64+0xf9/0x620 [ 699.851472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.856662] RIP: 0033:0x7f9963486ae9 08:30:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 4) [ 699.860365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.879268] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 699.886979] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963486ae9 [ 699.894241] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f99634e00fb [ 699.901631] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 699.908902] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 699.916160] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 [ 699.996330] FAULT_INJECTION: forcing a failure. [ 699.996330] name failslab, interval 1, probability 0, space 0, times 0 [ 700.008008] CPU: 1 PID: 10399 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 700.015897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.025258] Call Trace: [ 700.027855] dump_stack+0x1fc/0x2ef [ 700.031495] should_fail.cold+0xa/0xf [ 700.035312] ? setup_fault_attr+0x200/0x200 [ 700.039639] ? lock_acquire+0x170/0x3c0 [ 700.043615] __should_failslab+0x115/0x180 [ 700.047879] should_failslab+0x5/0x10 [ 700.051672] kmem_cache_alloc+0x277/0x370 [ 700.055821] __alloc_file+0x21/0x340 [ 700.059541] alloc_empty_file+0x6d/0x170 [ 700.063593] alloc_file+0x5e/0x4d0 [ 700.067127] alloc_file_pseudo+0x165/0x250 [ 700.071356] ? alloc_file+0x4d0/0x4d0 [ 700.075146] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 700.080758] ? shmem_get_inode+0x44c/0x8d0 [ 700.084985] __shmem_file_setup.part.0+0x102/0x2b0 [ 700.090006] shmem_file_setup+0x61/0x90 [ 700.093968] __se_sys_memfd_create+0x26b/0x440 [ 700.098536] ? memfd_file_seals_ptr+0x150/0x150 [ 700.103197] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 700.108553] ? trace_hardirqs_off_caller+0x6e/0x210 [ 700.113575] ? do_syscall_64+0x21/0x620 [ 700.117538] do_syscall_64+0xf9/0x620 [ 700.121330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.126509] RIP: 0033:0x7f9963486ae9 [ 700.130224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.149118] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 700.156816] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963486ae9 [ 700.164074] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f99634e00fb [ 700.171333] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 700.178591] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 700.185848] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 08:30:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000edc000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000006c0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 700.250881] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10402) [ 700.263116] BTRFS error (device loop2): superblock checksum mismatch [ 700.270732] BTRFS error (device loop2): open_ctree failed [ 700.290138] BTRFS error (device loop2): superblock checksum mismatch 08:30:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 5) 08:30:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000001fffff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010006ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 700.358893] BTRFS error (device loop2): open_ctree failed [ 700.386814] FAULT_INJECTION: forcing a failure. [ 700.386814] name failslab, interval 1, probability 0, space 0, times 0 [ 700.398343] CPU: 1 PID: 10424 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 700.406225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.415566] Call Trace: [ 700.418151] dump_stack+0x1fc/0x2ef [ 700.421778] should_fail.cold+0xa/0xf [ 700.425625] ? setup_fault_attr+0x200/0x200 [ 700.429933] ? lock_acquire+0x170/0x3c0 [ 700.433909] __should_failslab+0x115/0x180 [ 700.438176] should_failslab+0x5/0x10 [ 700.441961] kmem_cache_alloc_trace+0x284/0x380 [ 700.446625] apparmor_file_alloc_security+0x394/0xad0 [ 700.451821] ? apparmor_file_receive+0x160/0x160 [ 700.456576] ? __alloc_file+0x21/0x340 [ 700.460453] security_file_alloc+0x40/0x90 [ 700.464753] __alloc_file+0xd8/0x340 [ 700.468457] alloc_empty_file+0x6d/0x170 [ 700.472516] alloc_file+0x5e/0x4d0 [ 700.476068] alloc_file_pseudo+0x165/0x250 [ 700.480295] ? alloc_file+0x4d0/0x4d0 [ 700.484091] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 700.489713] ? shmem_get_inode+0x44c/0x8d0 [ 700.493956] __shmem_file_setup.part.0+0x102/0x2b0 [ 700.498883] shmem_file_setup+0x61/0x90 [ 700.502856] __se_sys_memfd_create+0x26b/0x440 [ 700.507432] ? memfd_file_seals_ptr+0x150/0x150 [ 700.512091] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 700.517537] ? trace_hardirqs_off_caller+0x6e/0x210 [ 700.522574] ? do_syscall_64+0x21/0x620 [ 700.526544] do_syscall_64+0xf9/0x620 [ 700.530332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.535514] RIP: 0033:0x7f9963486ae9 [ 700.539296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:30:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 6) [ 700.558184] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 700.565879] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963486ae9 [ 700.573140] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f99634e00fb [ 700.580400] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 700.587708] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 700.594974] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200005c0 [ 700.700409] FAULT_INJECTION: forcing a failure. [ 700.700409] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 700.712642] CPU: 0 PID: 10434 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 700.720535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.729888] Call Trace: [ 700.732476] dump_stack+0x1fc/0x2ef [ 700.736112] should_fail.cold+0xa/0xf [ 700.739915] ? lock_acquire+0x170/0x3c0 [ 700.743893] ? setup_fault_attr+0x200/0x200 [ 700.748230] __alloc_pages_nodemask+0x239/0x2890 [ 700.753013] ? perf_swevent_event+0x6c/0x550 [ 700.757438] ? tracing_generic_entry_update+0x191/0x200 [ 700.762816] ? perf_tp_event+0x5f4/0xaa0 [ 700.766951] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 700.771806] ? __lock_acquire+0x6de/0x3ff0 [ 700.776056] ? perf_trace_run_bpf_submit+0x144/0x220 [ 700.781153] ? perf_trace_run_bpf_submit+0x144/0x220 [ 700.786272] ? mark_held_locks+0xf0/0xf0 [ 700.790339] ? perf_trace_lock_acquire+0x36b/0x530 [ 700.795264] alloc_pages_vma+0xf2/0x780 [ 700.799235] shmem_alloc_page+0x11c/0x1f0 [ 700.803390] ? shmem_swapin+0x220/0x220 [ 700.807418] ? percpu_counter_add_batch+0x126/0x180 [ 700.812457] ? __vm_enough_memory+0x316/0x650 [ 700.816954] shmem_alloc_and_acct_page+0x15a/0x850 [ 700.821911] shmem_getpage_gfp+0x4e9/0x37f0 [ 700.826255] ? shmem_alloc_and_acct_page+0x850/0x850 [ 700.831352] ? mark_held_locks+0xa6/0xf0 [ 700.835415] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 700.840614] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 700.845914] shmem_write_begin+0xff/0x1e0 [ 700.850080] generic_perform_write+0x1f8/0x4d0 [ 700.854690] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 700.859349] ? current_time+0x1c0/0x1c0 [ 700.863326] ? lock_acquire+0x170/0x3c0 [ 700.867334] __generic_file_write_iter+0x24b/0x610 [ 700.872267] generic_file_write_iter+0x3f8/0x730 [ 700.877022] __vfs_write+0x51b/0x770 [ 700.880737] ? kernel_read+0x110/0x110 [ 700.884656] ? check_preemption_disabled+0x41/0x280 [ 700.889680] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 700.894710] vfs_write+0x1f3/0x540 [ 700.898259] __x64_sys_pwrite64+0x1f7/0x250 [ 700.902572] ? ksys_pwrite64+0x1a0/0x1a0 [ 700.906627] ? trace_hardirqs_off_caller+0x6e/0x210 [ 700.911636] ? do_syscall_64+0x21/0x620 [ 700.915607] do_syscall_64+0xf9/0x620 [ 700.919417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.924599] RIP: 0033:0x7f9963439ab7 [ 700.928299] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 700.947191] RSP: 002b:00007f99609fbf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 700.955082] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f9963439ab7 [ 700.962342] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000005 [ 700.969606] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 700.976894] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 700.984155] R13: 0000000000000005 R14: 00000000200009c0 R15: 0000000000000000 08:30:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:30:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00fffffff500000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000740800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:30:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 7) 08:30:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010007ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:30:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500007fffffff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 701.206496] FAULT_INJECTION: forcing a failure. [ 701.206496] name failslab, interval 1, probability 0, space 0, times 0 [ 701.217797] CPU: 1 PID: 10458 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 701.225661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.235004] Call Trace: [ 701.237590] dump_stack+0x1fc/0x2ef [ 701.241204] should_fail.cold+0xa/0xf [ 701.244991] ? setup_fault_attr+0x200/0x200 [ 701.249317] ? __lock_acquire+0x6de/0x3ff0 [ 701.253543] __should_failslab+0x115/0x180 [ 701.257779] should_failslab+0x5/0x10 [ 701.261575] kmem_cache_alloc+0x3f/0x370 [ 701.265624] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 701.271248] __radix_tree_create+0x314/0x540 [ 701.275671] __radix_tree_insert+0xbb/0x5f0 [ 701.280028] ? __radix_tree_create+0x540/0x540 [ 701.284596] ? lock_acquire+0x170/0x3c0 [ 701.288553] ? shmem_add_to_page_cache+0x306/0xbb0 [ 701.293472] shmem_add_to_page_cache+0x616/0xbb0 [ 701.298212] ? shmem_recalc_inode+0x310/0x310 [ 701.302690] ? __radix_tree_preload+0x1fe/0x280 [ 701.307347] shmem_getpage_gfp+0x2004/0x37f0 [ 701.311765] ? shmem_alloc_and_acct_page+0x850/0x850 [ 701.316876] ? mark_held_locks+0xa6/0xf0 [ 701.320935] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 701.326128] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 701.331313] shmem_write_begin+0xff/0x1e0 [ 701.335549] generic_perform_write+0x1f8/0x4d0 [ 701.340120] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 701.344769] ? current_time+0x1c0/0x1c0 [ 701.348728] ? lock_acquire+0x170/0x3c0 [ 701.352686] __generic_file_write_iter+0x24b/0x610 [ 701.357606] generic_file_write_iter+0x3f8/0x730 [ 701.362351] __vfs_write+0x51b/0x770 [ 701.366050] ? kernel_read+0x110/0x110 [ 701.369929] ? check_preemption_disabled+0x41/0x280 [ 701.374936] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 701.379946] vfs_write+0x1f3/0x540 [ 701.383485] __x64_sys_pwrite64+0x1f7/0x250 [ 701.387801] ? ksys_pwrite64+0x1a0/0x1a0 [ 701.391869] ? trace_hardirqs_off_caller+0x6e/0x210 [ 701.396883] ? do_syscall_64+0x21/0x620 [ 701.400843] do_syscall_64+0xf9/0x620 [ 701.404650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.409830] RIP: 0033:0x7f9963439ab7 [ 701.413525] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 701.432410] RSP: 002b:00007f99609fbf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 701.440122] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f9963439ab7 [ 701.447376] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000005 [ 701.454642] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 701.461911] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 701.469179] R13: 0000000000000005 R14: 00000000200009c0 R15: 0000000000000000 [ 701.534245] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10459) [ 701.549201] BTRFS error (device loop2): superblock checksum mismatch [ 701.577958] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (10460) 08:31:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000007a0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 8) [ 701.696962] BTRFS error (device loop2): open_ctree failed [ 701.703480] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10459) [ 701.717132] BTRFS error (device loop2): superblock checksum mismatch 08:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010009ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00fffffff600000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 701.838828] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10476) [ 701.894589] FAULT_INJECTION: forcing a failure. [ 701.894589] name failslab, interval 1, probability 0, space 0, times 0 [ 701.906149] CPU: 0 PID: 10493 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 701.914039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.923454] Call Trace: [ 701.926050] dump_stack+0x1fc/0x2ef [ 701.929675] should_fail.cold+0xa/0xf [ 701.933470] ? setup_fault_attr+0x200/0x200 [ 701.937796] ? lock_acquire+0x170/0x3c0 [ 701.941777] __should_failslab+0x115/0x180 [ 701.946010] should_failslab+0x5/0x10 [ 701.949813] kmem_cache_alloc+0x277/0x370 [ 701.953964] getname_flags+0xce/0x590 [ 701.957760] do_sys_open+0x26c/0x520 [ 701.961473] ? filp_open+0x70/0x70 [ 701.965026] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 701.970403] ? trace_hardirqs_off_caller+0x6e/0x210 [ 701.975426] ? do_syscall_64+0x21/0x620 [ 701.979404] do_syscall_64+0xf9/0x620 [ 701.983203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.988399] RIP: 0033:0x7f9963439a04 [ 701.992101] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 702.010991] RSP: 002b:00007f99609fbed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 702.018686] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f9963439a04 [ 702.025953] RDX: 0000000000000002 RSI: 00007f99609fc000 RDI: 00000000ffffff9c [ 702.033259] RBP: 00007f99609fc000 R08: 0000000000000000 R09: ffffffffffffffff 08:31:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 9) [ 702.040518] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 702.047773] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 [ 702.150528] FAULT_INJECTION: forcing a failure. [ 702.150528] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 702.162343] CPU: 0 PID: 10505 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 702.170232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.179597] Call Trace: [ 702.182276] dump_stack+0x1fc/0x2ef [ 702.185903] should_fail.cold+0xa/0xf [ 702.189700] ? setup_fault_attr+0x200/0x200 [ 702.194013] ? do_writepages+0x290/0x290 [ 702.198067] ? unlock_page+0x13d/0x230 [ 702.201954] __alloc_pages_nodemask+0x239/0x2890 [ 702.206706] ? generic_perform_write+0x36c/0x4d0 [ 702.211492] ? __lock_acquire+0x6de/0x3ff0 [ 702.215726] ? perf_trace_run_bpf_submit+0x144/0x220 [ 702.220831] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 702.225674] ? perf_trace_run_bpf_submit+0x144/0x220 [ 702.230796] ? perf_trace_lock_acquire+0x36b/0x530 [ 702.235732] ? HARDIRQ_verbose+0x10/0x10 [ 702.239789] cache_grow_begin+0xa4/0x8a0 [ 702.243867] ? setup_fault_attr+0x200/0x200 [ 702.248178] ? lock_acquire+0x170/0x3c0 [ 702.252156] cache_alloc_refill+0x273/0x340 [ 702.256500] kmem_cache_alloc+0x346/0x370 [ 702.260654] getname_flags+0xce/0x590 [ 702.264461] do_sys_open+0x26c/0x520 [ 702.268170] ? filp_open+0x70/0x70 [ 702.271705] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 702.277060] ? trace_hardirqs_off_caller+0x6e/0x210 [ 702.282084] ? do_syscall_64+0x21/0x620 [ 702.286053] do_syscall_64+0xf9/0x620 [ 702.289864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.295054] RIP: 0033:0x7f9963439a04 [ 702.298754] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 702.317647] RSP: 002b:00007f99609fbed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 702.325357] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f9963439a04 [ 702.332660] RDX: 0000000000000002 RSI: 00007f99609fc000 RDI: 00000000ffffff9c [ 702.339928] RBP: 00007f99609fc000 R08: 0000000000000000 R09: ffffffffffffffff [ 702.347194] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 702.354466] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 [ 702.412320] BTRFS error (device loop2): open_ctree failed [ 702.451027] BTRFS error (device loop2): superblock checksum mismatch 08:31:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500008cffffff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 702.458217] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10500) [ 702.489633] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10503) 08:31:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00fffffdfc00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 10) 08:31:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000fdef0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 702.691147] FAULT_INJECTION: forcing a failure. [ 702.691147] name failslab, interval 1, probability 0, space 0, times 0 [ 702.707151] BTRFS error (device loop2): open_ctree failed [ 702.714129] CPU: 0 PID: 10534 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 702.722031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.731392] Call Trace: [ 702.734001] dump_stack+0x1fc/0x2ef [ 702.737650] should_fail.cold+0xa/0xf [ 702.741562] ? setup_fault_attr+0x200/0x200 [ 702.745893] ? lock_acquire+0x170/0x3c0 [ 702.749904] __should_failslab+0x115/0x180 [ 702.754163] should_failslab+0x5/0x10 [ 702.757964] kmem_cache_alloc+0x277/0x370 [ 702.762131] __alloc_file+0x21/0x340 [ 702.765857] alloc_empty_file+0x6d/0x170 [ 702.769931] path_openat+0xe9/0x2df0 [ 702.773647] ? __lock_acquire+0x6de/0x3ff0 [ 702.777886] ? check_preemption_disabled+0x41/0x280 [ 702.782904] ? path_lookupat+0x8d0/0x8d0 [ 702.786966] ? mark_held_locks+0xf0/0xf0 [ 702.791044] do_filp_open+0x18c/0x3f0 [ 702.794846] ? may_open_dev+0xf0/0xf0 [ 702.798651] ? __alloc_fd+0x28d/0x570 [ 702.802457] ? lock_downgrade+0x720/0x720 [ 702.806634] ? lock_acquire+0x170/0x3c0 [ 702.810619] ? __alloc_fd+0x34/0x570 [ 702.814438] ? do_raw_spin_unlock+0x171/0x230 [ 702.818956] ? _raw_spin_unlock+0x29/0x40 [ 702.823118] ? __alloc_fd+0x28d/0x570 [ 702.826953] do_sys_open+0x3b3/0x520 [ 702.830683] ? filp_open+0x70/0x70 [ 702.834230] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 702.839588] ? trace_hardirqs_off_caller+0x6e/0x210 [ 702.844608] ? do_syscall_64+0x21/0x620 [ 702.848601] do_syscall_64+0xf9/0x620 [ 702.852429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.857620] RIP: 0033:0x7f9963439a04 [ 702.861325] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 702.880243] RSP: 002b:00007f99609fbed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 08:31:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 11) [ 702.888006] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f9963439a04 [ 702.895276] RDX: 0000000000000002 RSI: 00007f99609fc000 RDI: 00000000ffffff9c [ 702.902540] RBP: 00007f99609fc000 R08: 0000000000000000 R09: ffffffffffffffff [ 702.909810] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 702.917101] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000001001fffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 703.012994] FAULT_INJECTION: forcing a failure. [ 703.012994] name failslab, interval 1, probability 0, space 0, times 0 [ 703.025952] CPU: 0 PID: 10545 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 703.033856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.043209] Call Trace: [ 703.045796] dump_stack+0x1fc/0x2ef [ 703.049421] should_fail.cold+0xa/0xf [ 703.053223] ? setup_fault_attr+0x200/0x200 [ 703.057536] ? lock_acquire+0x170/0x3c0 [ 703.061548] __should_failslab+0x115/0x180 [ 703.065790] should_failslab+0x5/0x10 [ 703.069578] kmem_cache_alloc_trace+0x284/0x380 [ 703.074254] apparmor_file_alloc_security+0x394/0xad0 [ 703.079453] ? apparmor_file_receive+0x160/0x160 [ 703.084220] ? __alloc_file+0x21/0x340 [ 703.088112] security_file_alloc+0x40/0x90 [ 703.092341] __alloc_file+0xd8/0x340 [ 703.096059] alloc_empty_file+0x6d/0x170 [ 703.100114] path_openat+0xe9/0x2df0 [ 703.103828] ? __lock_acquire+0x6de/0x3ff0 [ 703.108063] ? check_preemption_disabled+0x41/0x280 [ 703.113087] ? path_lookupat+0x8d0/0x8d0 [ 703.117143] ? mark_held_locks+0xf0/0xf0 [ 703.121204] do_filp_open+0x18c/0x3f0 [ 703.125002] ? may_open_dev+0xf0/0xf0 [ 703.128805] ? __alloc_fd+0x28d/0x570 [ 703.132616] ? lock_downgrade+0x720/0x720 [ 703.136774] ? lock_acquire+0x170/0x3c0 [ 703.140764] ? __alloc_fd+0x34/0x570 [ 703.144511] ? do_raw_spin_unlock+0x171/0x230 [ 703.149024] ? _raw_spin_unlock+0x29/0x40 [ 703.153190] ? __alloc_fd+0x28d/0x570 [ 703.157024] do_sys_open+0x3b3/0x520 [ 703.160761] ? filp_open+0x70/0x70 [ 703.164759] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 703.170147] ? trace_hardirqs_off_caller+0x6e/0x210 [ 703.175175] ? do_syscall_64+0x21/0x620 [ 703.179159] do_syscall_64+0xf9/0x620 [ 703.182969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.188151] RIP: 0033:0x7f9963439a04 [ 703.191868] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 703.210771] RSP: 002b:00007f99609fbed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 703.218472] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f9963439a04 [ 703.225750] RDX: 0000000000000002 RSI: 00007f99609fc000 RDI: 00000000ffffff9c [ 703.233012] RBP: 00007f99609fc000 R08: 0000000000000000 R09: ffffffffffffffff [ 703.240273] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 703.247533] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 12) 08:31:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000097ffffff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 703.290704] BTRFS error (device loop2): superblock checksum mismatch [ 703.309393] BTRFS error (device loop2): open_ctree failed [ 703.349711] BTRFS error (device loop2): superblock checksum mismatch [ 703.452241] BTRFS error (device loop2): open_ctree failed [ 703.457996] FAULT_INJECTION: forcing a failure. [ 703.457996] name failslab, interval 1, probability 0, space 0, times 0 [ 703.469792] CPU: 0 PID: 10565 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 703.477686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.487048] Call Trace: [ 703.489649] dump_stack+0x1fc/0x2ef [ 703.493305] should_fail.cold+0xa/0xf 08:31:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 703.497516] ? setup_fault_attr+0x200/0x200 [ 703.502905] ? lock_acquire+0x170/0x3c0 [ 703.506915] __should_failslab+0x115/0x180 [ 703.511169] should_failslab+0x5/0x10 [ 703.514975] kmem_cache_alloc_trace+0x284/0x380 [ 703.519665] ? loop_info64_to_compat+0x5e0/0x5e0 [ 703.524440] __kthread_create_on_node+0xd2/0x410 [ 703.529212] ? kthread_parkme+0xa0/0xa0 [ 703.533209] ? lock_acquire+0x170/0x3c0 [ 703.537179] ? lo_ioctl+0x1bb/0x20e0 [ 703.540899] ? __mutex_lock+0x368/0x1190 [ 703.544964] ? lock_downgrade+0x720/0x720 [ 703.549108] ? check_preemption_disabled+0x41/0x280 [ 703.554139] ? loop_info64_to_compat+0x5e0/0x5e0 [ 703.558895] kthread_create_on_node+0xbb/0xf0 [ 703.563397] ? __kthread_create_on_node+0x410/0x410 [ 703.568428] ? __fget+0x356/0x510 [ 703.571903] ? do_dup2+0x450/0x450 [ 703.575441] ? __lockdep_init_map+0x100/0x5a0 [ 703.579949] ? __lockdep_init_map+0x100/0x5a0 [ 703.584452] lo_ioctl+0xae5/0x20e0 [ 703.587996] ? loop_set_status64+0x110/0x110 [ 703.592419] blkdev_ioctl+0x5cb/0x1a80 [ 703.596305] ? blkpg_ioctl+0x9d0/0x9d0 [ 703.600211] ? mark_held_locks+0xf0/0xf0 [ 703.604274] ? perf_trace_lock_acquire+0x36b/0x530 [ 703.609199] ? debug_check_no_obj_freed+0x201/0x490 [ 703.614219] ? HARDIRQ_verbose+0x10/0x10 [ 703.618282] block_ioctl+0xe9/0x130 [ 703.621909] ? blkdev_fallocate+0x3f0/0x3f0 [ 703.626250] do_vfs_ioctl+0xcdb/0x12e0 [ 703.630135] ? lock_downgrade+0x720/0x720 [ 703.634279] ? check_preemption_disabled+0x41/0x280 [ 703.639290] ? ioctl_preallocate+0x200/0x200 [ 703.643706] ? __fget+0x356/0x510 [ 703.647161] ? do_dup2+0x450/0x450 [ 703.650701] ? do_sys_open+0x2bf/0x520 [ 703.654595] ksys_ioctl+0x9b/0xc0 [ 703.658048] __x64_sys_ioctl+0x6f/0xb0 [ 703.661944] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 703.666525] do_syscall_64+0xf9/0x620 [ 703.670329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.675515] RIP: 0033:0x7f99634868a7 [ 703.679223] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:31:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010020ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 703.698130] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 703.705835] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 703.713097] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 703.720371] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 703.727636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 703.734902] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 13) [ 703.765440] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10559) 08:31:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00fffffdfd00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000e4ffffff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 703.816027] BTRFS error (device loop2): superblock checksum mismatch [ 703.871742] BTRFS error (device loop2): open_ctree failed 08:31:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 703.917002] FAULT_INJECTION: forcing a failure. [ 703.917002] name failslab, interval 1, probability 0, space 0, times 0 [ 703.928690] CPU: 0 PID: 10583 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 703.936596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.945948] Call Trace: [ 703.948548] dump_stack+0x1fc/0x2ef [ 703.952190] should_fail.cold+0xa/0xf [ 703.955996] ? setup_fault_attr+0x200/0x200 [ 703.960320] ? lock_acquire+0x170/0x3c0 [ 703.964299] __should_failslab+0x115/0x180 [ 703.968529] should_failslab+0x5/0x10 [ 703.972329] kmem_cache_alloc+0x277/0x370 [ 703.976470] __kernfs_new_node+0xd2/0x680 [ 703.980611] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 703.985400] ? check_preemption_disabled+0x41/0x280 [ 703.990407] ? check_preemption_disabled+0x41/0x280 [ 703.995423] ? mark_held_locks+0xf0/0xf0 [ 703.999477] ? perf_trace_lock_acquire+0x36b/0x530 [ 704.004397] ? set_user_nice.part.0+0x3b9/0xab0 [ 704.009082] kernfs_create_dir_ns+0x9e/0x230 [ 704.013509] internal_create_group+0x1c1/0xb20 [ 704.018103] ? sysfs_remove_link_from_group+0x70/0x70 [ 704.023298] ? lock_downgrade+0x720/0x720 [ 704.027495] lo_ioctl+0xf7c/0x20e0 [ 704.031034] ? loop_set_status64+0x110/0x110 [ 704.035481] blkdev_ioctl+0x5cb/0x1a80 [ 704.039421] ? blkpg_ioctl+0x9d0/0x9d0 [ 704.043312] ? mark_held_locks+0xf0/0xf0 [ 704.047368] ? perf_trace_lock_acquire+0x36b/0x530 [ 704.052311] ? debug_check_no_obj_freed+0x201/0x490 [ 704.057344] ? HARDIRQ_verbose+0x10/0x10 [ 704.061417] block_ioctl+0xe9/0x130 [ 704.065046] ? blkdev_fallocate+0x3f0/0x3f0 [ 704.069449] do_vfs_ioctl+0xcdb/0x12e0 [ 704.073342] ? lock_downgrade+0x720/0x720 [ 704.077495] ? check_preemption_disabled+0x41/0x280 [ 704.082532] ? ioctl_preallocate+0x200/0x200 [ 704.086952] ? __fget+0x356/0x510 [ 704.090420] ? do_dup2+0x450/0x450 [ 704.093971] ? do_sys_open+0x2bf/0x520 [ 704.097877] ksys_ioctl+0x9b/0xc0 [ 704.101363] __x64_sys_ioctl+0x6f/0xb0 [ 704.105241] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 704.109819] do_syscall_64+0xf9/0x620 [ 704.113623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.118819] RIP: 0033:0x7f99634868a7 [ 704.122549] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.141471] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 704.149175] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 704.156550] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 704.163821] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 704.171086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 704.178356] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000effd0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 14) 08:31:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010023ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 704.321709] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10584) [ 704.334434] FAULT_INJECTION: forcing a failure. [ 704.334434] name failslab, interval 1, probability 0, space 0, times 0 [ 704.347690] CPU: 0 PID: 10602 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 704.355750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.365091] Call Trace: [ 704.367673] dump_stack+0x1fc/0x2ef [ 704.371314] should_fail.cold+0xa/0xf [ 704.375118] ? setup_fault_attr+0x200/0x200 [ 704.379429] ? lock_acquire+0x170/0x3c0 [ 704.383420] __should_failslab+0x115/0x180 [ 704.387649] should_failslab+0x5/0x10 [ 704.391444] kmem_cache_alloc+0x277/0x370 [ 704.395585] __kernfs_new_node+0xd2/0x680 [ 704.399723] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 704.404465] ? kernfs_activate+0x2c/0x1d0 [ 704.408615] ? lock_downgrade+0x720/0x720 [ 704.412777] ? kernfs_add_one+0x51/0x4c0 [ 704.416829] ? mutex_trylock+0x1a0/0x1a0 [ 704.420880] ? __mutex_unlock_slowpath+0xea/0x610 [ 704.425730] kernfs_new_node+0x92/0x120 [ 704.429756] __kernfs_create_file+0x51/0x340 [ 704.434172] sysfs_add_file_mode_ns+0x226/0x540 [ 704.438839] internal_create_group+0x355/0xb20 [ 704.443415] ? sysfs_remove_link_from_group+0x70/0x70 [ 704.448607] ? lock_downgrade+0x720/0x720 [ 704.452763] lo_ioctl+0xf7c/0x20e0 [ 704.456296] ? loop_set_status64+0x110/0x110 [ 704.460707] blkdev_ioctl+0x5cb/0x1a80 [ 704.464589] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.469945] ? blkpg_ioctl+0x9d0/0x9d0 [ 704.473827] ? mark_held_locks+0xf0/0xf0 [ 704.477895] ? perf_trace_lock_acquire+0xef/0x530 [ 704.482737] ? debug_check_no_obj_freed+0x201/0x490 [ 704.487858] ? HARDIRQ_verbose+0x10/0x10 [ 704.492000] block_ioctl+0xe9/0x130 [ 704.495626] ? blkdev_fallocate+0x3f0/0x3f0 [ 704.499960] do_vfs_ioctl+0xcdb/0x12e0 [ 704.503851] ? lock_downgrade+0x720/0x720 [ 704.508003] ? check_preemption_disabled+0x41/0x280 [ 704.513012] ? ioctl_preallocate+0x200/0x200 [ 704.517421] ? __fget+0x356/0x510 [ 704.520873] ? do_dup2+0x450/0x450 [ 704.524416] ? do_sys_open+0x2bf/0x520 [ 704.528310] ksys_ioctl+0x9b/0xc0 [ 704.531758] __x64_sys_ioctl+0x6f/0xb0 [ 704.535639] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 704.540217] do_syscall_64+0xf9/0x620 [ 704.544018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.549213] RIP: 0033:0x7f99634868a7 [ 704.552913] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.571814] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 704.579538] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 704.586810] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 704.594097] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 704.601360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 704.608623] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000f5ffffff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00fffffffd00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 704.810472] BTRFS error (device loop2): superblock checksum mismatch [ 704.835813] BTRFS error (device loop2): open_ctree failed 08:31:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 15) [ 704.857547] BTRFS error (device loop2): superblock checksum mismatch [ 704.872606] BTRFS error (device loop2): open_ctree failed 08:31:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000007000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 704.904290] BTRFS error (device loop2): superblock checksum mismatch [ 704.920012] BTRFS error (device loop2): open_ctree failed [ 704.933875] BTRFS error (device loop2): superblock checksum mismatch [ 704.997102] FAULT_INJECTION: forcing a failure. [ 704.997102] name failslab, interval 1, probability 0, space 0, times 0 [ 705.008527] CPU: 1 PID: 10636 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 705.016409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.025775] Call Trace: [ 705.028360] dump_stack+0x1fc/0x2ef [ 705.032003] should_fail.cold+0xa/0xf [ 705.035814] ? setup_fault_attr+0x200/0x200 [ 705.040137] ? lock_acquire+0x170/0x3c0 [ 705.044120] __should_failslab+0x115/0x180 [ 705.048359] should_failslab+0x5/0x10 [ 705.052158] kmem_cache_alloc+0x277/0x370 [ 705.056336] __kernfs_new_node+0xd2/0x680 [ 705.060484] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 705.065247] ? __mutex_unlock_slowpath+0xea/0x610 [ 705.070096] ? wait_for_completion_io+0x10/0x10 [ 705.074792] ? kernfs_next_descendant_post+0x19c/0x290 [ 705.080068] kernfs_new_node+0x92/0x120 [ 705.084029] __kernfs_create_file+0x51/0x340 [ 705.088443] sysfs_add_file_mode_ns+0x226/0x540 [ 705.093118] internal_create_group+0x355/0xb20 [ 705.097718] ? sysfs_remove_link_from_group+0x70/0x70 [ 705.102912] ? lock_downgrade+0x720/0x720 [ 705.107080] lo_ioctl+0xf7c/0x20e0 [ 705.110620] ? loop_set_status64+0x110/0x110 [ 705.115038] blkdev_ioctl+0x5cb/0x1a80 [ 705.118921] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.124271] ? blkpg_ioctl+0x9d0/0x9d0 [ 705.128152] ? mark_held_locks+0xf0/0xf0 [ 705.132214] ? perf_trace_lock_acquire+0xef/0x530 [ 705.137062] ? debug_check_no_obj_freed+0x201/0x490 [ 705.142075] ? HARDIRQ_verbose+0x10/0x10 [ 705.146140] block_ioctl+0xe9/0x130 [ 705.149777] ? blkdev_fallocate+0x3f0/0x3f0 [ 705.154102] do_vfs_ioctl+0xcdb/0x12e0 [ 705.157996] ? lock_downgrade+0x720/0x720 [ 705.162142] ? check_preemption_disabled+0x41/0x280 [ 705.167146] ? ioctl_preallocate+0x200/0x200 [ 705.171550] ? __fget+0x356/0x510 [ 705.175008] ? do_dup2+0x450/0x450 [ 705.178543] ? do_sys_open+0x2bf/0x520 [ 705.182423] ksys_ioctl+0x9b/0xc0 [ 705.185875] __x64_sys_ioctl+0x6f/0xb0 [ 705.189754] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 705.194330] do_syscall_64+0xf9/0x620 [ 705.198138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.203322] RIP: 0033:0x7f99634868a7 [ 705.207022] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.225914] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 705.233612] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 705.240967] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 705.248221] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 705.255483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 705.262746] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 [ 705.339989] BTRFS error (device loop2): open_ctree failed [ 705.474297] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (10650) [ 705.507948] BTRFS error (device loop2): superblock checksum mismatch 08:31:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000fff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 16) 08:31:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000f6ffffff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 705.595657] BTRFS error (device loop2): open_ctree failed [ 705.625021] BTRFS error (device loop2): superblock checksum mismatch 08:31:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000000000000d000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000001003fffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 705.672694] BTRFS error (device loop2): open_ctree failed [ 705.755150] FAULT_INJECTION: forcing a failure. [ 705.755150] name failslab, interval 1, probability 0, space 0, times 0 [ 705.775511] CPU: 1 PID: 10677 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 705.783417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.792772] Call Trace: [ 705.795393] dump_stack+0x1fc/0x2ef [ 705.799026] should_fail.cold+0xa/0xf [ 705.802834] ? setup_fault_attr+0x200/0x200 [ 705.807153] ? lock_acquire+0x170/0x3c0 [ 705.811123] __should_failslab+0x115/0x180 [ 705.815524] should_failslab+0x5/0x10 [ 705.819312] kmem_cache_alloc+0x277/0x370 [ 705.823489] __kernfs_new_node+0xd2/0x680 [ 705.827654] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 705.832397] ? __mutex_unlock_slowpath+0xea/0x610 [ 705.837227] ? wait_for_completion_io+0x10/0x10 [ 705.841892] ? kernfs_next_descendant_post+0x19c/0x290 [ 705.847166] kernfs_new_node+0x92/0x120 [ 705.851170] __kernfs_create_file+0x51/0x340 [ 705.855570] sysfs_add_file_mode_ns+0x226/0x540 [ 705.860233] internal_create_group+0x355/0xb20 [ 705.864821] ? sysfs_remove_link_from_group+0x70/0x70 [ 705.870129] ? lock_downgrade+0x720/0x720 [ 705.874299] lo_ioctl+0xf7c/0x20e0 [ 705.877846] ? loop_set_status64+0x110/0x110 [ 705.882265] blkdev_ioctl+0x5cb/0x1a80 [ 705.886161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.891539] ? blkpg_ioctl+0x9d0/0x9d0 [ 705.895429] ? mark_held_locks+0xf0/0xf0 [ 705.899489] ? perf_trace_lock_acquire+0xef/0x530 [ 705.904329] ? debug_check_no_obj_freed+0x201/0x490 [ 705.909348] ? HARDIRQ_verbose+0x10/0x10 [ 705.913398] block_ioctl+0xe9/0x130 [ 705.917008] ? blkdev_fallocate+0x3f0/0x3f0 [ 705.921316] do_vfs_ioctl+0xcdb/0x12e0 [ 705.925205] ? lock_downgrade+0x720/0x720 [ 705.929355] ? check_preemption_disabled+0x41/0x280 [ 705.934361] ? ioctl_preallocate+0x200/0x200 [ 705.938761] ? __fget+0x356/0x510 [ 705.942214] ? do_dup2+0x450/0x450 [ 705.945785] ? do_sys_open+0x2bf/0x520 [ 705.949678] ksys_ioctl+0x9b/0xc0 [ 705.953145] __x64_sys_ioctl+0x6f/0xb0 [ 705.957113] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 705.961685] do_syscall_64+0xf9/0x620 [ 705.965486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.970728] RIP: 0033:0x7f99634868a7 [ 705.974436] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.993322] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 706.001020] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 706.008319] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 706.015628] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 706.022892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 706.030245] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 17) 08:31:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00001fffff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000fdffffff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 706.291777] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10694) [ 706.307385] FAULT_INJECTION: forcing a failure. [ 706.307385] name failslab, interval 1, probability 0, space 0, times 0 [ 706.319336] CPU: 0 PID: 10706 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 706.327250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.336696] Call Trace: [ 706.338779] BTRFS error (device loop2): superblock checksum mismatch [ 706.339290] dump_stack+0x1fc/0x2ef [ 706.339318] should_fail.cold+0xa/0xf [ 706.339340] ? setup_fault_attr+0x200/0x200 [ 706.357577] ? lock_acquire+0x170/0x3c0 [ 706.361566] __should_failslab+0x115/0x180 [ 706.365845] should_failslab+0x5/0x10 [ 706.369658] kmem_cache_alloc+0x277/0x370 [ 706.373839] __kernfs_new_node+0xd2/0x680 [ 706.377998] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 706.382753] ? __mutex_unlock_slowpath+0xea/0x610 [ 706.387620] ? wait_for_completion_io+0x10/0x10 [ 706.392302] ? kernfs_next_descendant_post+0x19c/0x290 [ 706.397608] kernfs_new_node+0x92/0x120 [ 706.401673] __kernfs_create_file+0x51/0x340 [ 706.406267] sysfs_add_file_mode_ns+0x226/0x540 [ 706.410969] internal_create_group+0x355/0xb20 [ 706.415558] ? sysfs_remove_link_from_group+0x70/0x70 [ 706.420759] ? lock_downgrade+0x720/0x720 [ 706.424959] lo_ioctl+0xf7c/0x20e0 [ 706.428504] ? loop_set_status64+0x110/0x110 [ 706.432943] blkdev_ioctl+0x5cb/0x1a80 [ 706.436851] ? blkpg_ioctl+0x9d0/0x9d0 [ 706.440752] ? mark_held_locks+0xf0/0xf0 [ 706.444819] ? perf_trace_lock_acquire+0x36b/0x530 [ 706.449758] ? debug_check_no_obj_freed+0x201/0x490 [ 706.454779] ? HARDIRQ_verbose+0x10/0x10 [ 706.458857] block_ioctl+0xe9/0x130 [ 706.462485] ? blkdev_fallocate+0x3f0/0x3f0 [ 706.466994] do_vfs_ioctl+0xcdb/0x12e0 [ 706.470901] ? lock_downgrade+0x720/0x720 [ 706.475057] ? check_preemption_disabled+0x41/0x280 [ 706.480089] ? ioctl_preallocate+0x200/0x200 [ 706.484519] ? __fget+0x356/0x510 [ 706.488006] ? do_dup2+0x450/0x450 [ 706.491643] ? do_sys_open+0x2bf/0x520 [ 706.495547] ksys_ioctl+0x9b/0xc0 [ 706.499012] __x64_sys_ioctl+0x6f/0xb0 [ 706.503000] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 706.507588] do_syscall_64+0xf9/0x620 [ 706.511401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.516605] RIP: 0033:0x7f99634868a7 [ 706.520310] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.539209] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 706.546921] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 706.554182] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 706.561463] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 706.568738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 706.576109] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 [ 706.624601] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10698) [ 706.652396] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10704) 08:31:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000007fffffff000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 706.683520] BTRFS error (device loop2): open_ctree failed [ 706.693722] BTRFS error (device loop2): superblock checksum mismatch 08:31:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00fcfdffff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 706.860161] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10694) 08:31:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000085f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000feffffff010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 18) 08:31:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000070000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010048ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 707.012166] BTRFS error (device loop2): open_ctree failed [ 707.099944] FAULT_INJECTION: forcing a failure. [ 707.099944] name failslab, interval 1, probability 0, space 0, times 0 [ 707.111514] CPU: 1 PID: 10741 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 707.119447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.128788] Call Trace: [ 707.131367] dump_stack+0x1fc/0x2ef [ 707.135003] should_fail.cold+0xa/0xf [ 707.138802] ? setup_fault_attr+0x200/0x200 [ 707.143121] ? lock_acquire+0x170/0x3c0 [ 707.147150] __should_failslab+0x115/0x180 [ 707.151376] should_failslab+0x5/0x10 [ 707.155163] kmem_cache_alloc+0x277/0x370 [ 707.159300] __kernfs_new_node+0xd2/0x680 [ 707.163471] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 707.168228] ? __mutex_unlock_slowpath+0xea/0x610 [ 707.173083] ? wait_for_completion_io+0x10/0x10 [ 707.177760] ? kernfs_next_descendant_post+0x19c/0x290 [ 707.183051] kernfs_new_node+0x92/0x120 [ 707.187024] __kernfs_create_file+0x51/0x340 [ 707.191426] sysfs_add_file_mode_ns+0x226/0x540 [ 707.196089] internal_create_group+0x355/0xb20 [ 707.200659] ? sysfs_remove_link_from_group+0x70/0x70 [ 707.205839] ? lock_downgrade+0x720/0x720 [ 707.209999] lo_ioctl+0xf7c/0x20e0 [ 707.213549] ? loop_set_status64+0x110/0x110 [ 707.217953] blkdev_ioctl+0x5cb/0x1a80 [ 707.221837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.227196] ? blkpg_ioctl+0x9d0/0x9d0 [ 707.231188] ? mark_held_locks+0xf0/0xf0 [ 707.235261] ? perf_trace_lock_acquire+0xef/0x530 [ 707.240203] ? debug_check_no_obj_freed+0x201/0x490 [ 707.245222] ? HARDIRQ_verbose+0x10/0x10 [ 707.249327] block_ioctl+0xe9/0x130 [ 707.252956] ? blkdev_fallocate+0x3f0/0x3f0 [ 707.257333] do_vfs_ioctl+0xcdb/0x12e0 [ 707.261213] ? lock_downgrade+0x720/0x720 [ 707.265380] ? check_preemption_disabled+0x41/0x280 [ 707.270400] ? ioctl_preallocate+0x200/0x200 [ 707.274814] ? __fget+0x356/0x510 [ 707.278264] ? do_dup2+0x450/0x450 [ 707.281942] ? do_sys_open+0x2bf/0x520 [ 707.285851] ksys_ioctl+0x9b/0xc0 [ 707.289302] __x64_sys_ioctl+0x6f/0xb0 [ 707.293192] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 707.297951] do_syscall_64+0xf9/0x620 [ 707.301745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.306926] RIP: 0033:0x7f99634868a7 [ 707.310830] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.329722] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 707.337425] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 707.344695] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 707.351971] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 707.359252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 707.366530] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00fdfdffff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 19) [ 707.566050] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (10742) [ 707.579113] BTRFS error (device loop2): superblock checksum mismatch [ 707.601741] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10746) 08:31:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000004000000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 707.682294] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10764) [ 707.700260] BTRFS error (device loop2): open_ctree failed [ 707.711352] BTRFS error (device loop2): superblock checksum mismatch [ 707.763804] FAULT_INJECTION: forcing a failure. [ 707.763804] name failslab, interval 1, probability 0, space 0, times 0 [ 707.776136] CPU: 0 PID: 10772 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 707.784054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.793416] Call Trace: [ 707.796032] dump_stack+0x1fc/0x2ef [ 707.799680] should_fail.cold+0xa/0xf [ 707.803497] ? setup_fault_attr+0x200/0x200 [ 707.807926] ? lock_acquire+0x170/0x3c0 [ 707.811912] __should_failslab+0x115/0x180 [ 707.816173] should_failslab+0x5/0x10 [ 707.819992] kmem_cache_alloc+0x277/0x370 [ 707.824164] __kernfs_new_node+0xd2/0x680 [ 707.828311] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 707.833086] ? __mutex_unlock_slowpath+0xea/0x610 [ 707.837943] ? wait_for_completion_io+0x10/0x10 [ 707.842657] ? kernfs_next_descendant_post+0x19c/0x290 [ 707.848064] kernfs_new_node+0x92/0x120 [ 707.852052] __kernfs_create_file+0x51/0x340 [ 707.856468] sysfs_add_file_mode_ns+0x226/0x540 [ 707.861144] internal_create_group+0x355/0xb20 [ 707.865833] ? sysfs_remove_link_from_group+0x70/0x70 [ 707.871114] ? lock_downgrade+0x720/0x720 [ 707.875410] lo_ioctl+0xf7c/0x20e0 [ 707.878951] ? loop_set_status64+0x110/0x110 [ 707.883359] blkdev_ioctl+0x5cb/0x1a80 [ 707.887243] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.892746] ? blkpg_ioctl+0x9d0/0x9d0 [ 707.896641] ? mark_held_locks+0xf0/0xf0 [ 707.900699] ? perf_trace_lock_acquire+0xef/0x530 [ 707.905551] ? debug_check_no_obj_freed+0x201/0x490 [ 707.910584] ? HARDIRQ_verbose+0x10/0x10 [ 707.914651] block_ioctl+0xe9/0x130 [ 707.918275] ? blkdev_fallocate+0x3f0/0x3f0 [ 707.922628] do_vfs_ioctl+0xcdb/0x12e0 [ 707.926540] ? lock_downgrade+0x720/0x720 [ 707.930689] ? check_preemption_disabled+0x41/0x280 [ 707.935704] ? ioctl_preallocate+0x200/0x200 [ 707.940129] ? __fget+0x356/0x510 [ 707.943595] ? do_dup2+0x450/0x450 [ 707.947138] ? do_sys_open+0x2bf/0x520 [ 707.951049] ksys_ioctl+0x9b/0xc0 [ 707.954496] __x64_sys_ioctl+0x6f/0xb0 [ 707.958375] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 707.963056] do_syscall_64+0xf9/0x620 [ 707.966860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.972039] RIP: 0033:0x7f99634868a7 [ 707.975754] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.994744] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 708.002494] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 708.009764] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 708.017036] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 708.024316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 708.031608] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000000d0000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 708.064526] BTRFS error (device loop2): open_ctree failed 08:31:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 20) 08:31:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000001004cffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 708.213819] FAULT_INJECTION: forcing a failure. [ 708.213819] name failslab, interval 1, probability 0, space 0, times 0 [ 708.230977] CPU: 1 PID: 10788 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 708.240345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.249682] Call Trace: [ 708.252281] dump_stack+0x1fc/0x2ef [ 708.255907] should_fail.cold+0xa/0xf [ 708.259697] ? setup_fault_attr+0x200/0x200 [ 708.264011] ? lock_acquire+0x170/0x3c0 [ 708.267976] ? dev_uevent_filter+0xd0/0xd0 [ 708.272203] __should_failslab+0x115/0x180 [ 708.276430] should_failslab+0x5/0x10 [ 708.280260] kmem_cache_alloc_trace+0x284/0x380 [ 708.284939] ? dev_uevent_filter+0xd0/0xd0 [ 708.289175] kobject_uevent_env+0x236/0x1480 [ 708.293589] lo_ioctl+0xff9/0x20e0 [ 708.297123] ? loop_set_status64+0x110/0x110 [ 708.301517] blkdev_ioctl+0x5cb/0x1a80 [ 708.305447] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.310804] ? blkpg_ioctl+0x9d0/0x9d0 [ 708.314683] ? mark_held_locks+0xf0/0xf0 [ 708.318742] ? perf_trace_lock_acquire+0xef/0x530 [ 708.323616] ? debug_check_no_obj_freed+0x201/0x490 [ 708.328633] ? HARDIRQ_verbose+0x10/0x10 [ 708.332702] block_ioctl+0xe9/0x130 [ 708.336338] ? blkdev_fallocate+0x3f0/0x3f0 [ 708.340672] do_vfs_ioctl+0xcdb/0x12e0 [ 708.344554] ? lock_downgrade+0x720/0x720 [ 708.348693] ? check_preemption_disabled+0x41/0x280 [ 708.353710] ? ioctl_preallocate+0x200/0x200 [ 708.358103] ? __fget+0x356/0x510 [ 708.361542] ? do_dup2+0x450/0x450 [ 708.365064] ? do_sys_open+0x2bf/0x520 [ 708.368943] ksys_ioctl+0x9b/0xc0 [ 708.372389] __x64_sys_ioctl+0x6f/0xb0 [ 708.376265] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 708.380834] do_syscall_64+0xf9/0x620 [ 708.384622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.389803] RIP: 0033:0x7f99634868a7 [ 708.393502] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:31:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c007fffffff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 708.412387] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 708.420079] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 708.427331] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 708.434602] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 708.441867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 708.449120] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000008000000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 21) 08:31:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000300000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 708.645465] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10803) [ 708.657845] BTRFS error (device loop2): superblock checksum mismatch [ 708.692220] BTRFS error (device loop2): open_ctree failed [ 708.699396] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (10813) [ 708.717247] BTRFS error (device loop2): superblock checksum mismatch [ 708.744601] FAULT_INJECTION: forcing a failure. [ 708.744601] name failslab, interval 1, probability 0, space 0, times 0 [ 708.756351] CPU: 0 PID: 10823 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 708.764252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.773606] Call Trace: [ 708.776204] dump_stack+0x1fc/0x2ef [ 708.779890] should_fail.cold+0xa/0xf [ 708.783700] ? setup_fault_attr+0x200/0x200 [ 708.788028] ? lock_acquire+0x170/0x3c0 [ 708.792020] __should_failslab+0x115/0x180 [ 708.796267] should_failslab+0x5/0x10 [ 708.800063] __kmalloc+0x2ab/0x3c0 [ 708.803661] ? kobject_get_path+0xbf/0x240 [ 708.807903] kobject_get_path+0xbf/0x240 [ 708.811975] kobject_uevent_env+0x25c/0x1480 [ 708.816410] lo_ioctl+0xff9/0x20e0 [ 708.819958] ? loop_set_status64+0x110/0x110 [ 708.824384] blkdev_ioctl+0x5cb/0x1a80 [ 708.828266] ? blkpg_ioctl+0x9d0/0x9d0 [ 708.832144] ? mark_held_locks+0xf0/0xf0 [ 708.836217] ? perf_trace_lock_acquire+0x36b/0x530 [ 708.841154] ? debug_check_no_obj_freed+0x201/0x490 [ 708.846190] ? HARDIRQ_verbose+0x10/0x10 [ 708.850257] block_ioctl+0xe9/0x130 [ 708.853872] ? blkdev_fallocate+0x3f0/0x3f0 [ 708.858183] do_vfs_ioctl+0xcdb/0x12e0 [ 708.862077] ? lock_downgrade+0x720/0x720 [ 708.866242] ? check_preemption_disabled+0x41/0x280 [ 708.871263] ? ioctl_preallocate+0x200/0x200 [ 708.875798] ? __fget+0x356/0x510 [ 708.879258] ? do_dup2+0x450/0x450 [ 708.882812] ? do_sys_open+0x2bf/0x520 [ 708.886754] ksys_ioctl+0x9b/0xc0 [ 708.890218] __x64_sys_ioctl+0x6f/0xb0 [ 708.894136] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 708.898724] do_syscall_64+0xf9/0x620 [ 708.902531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.907714] RIP: 0033:0x7f99634868a7 [ 708.911413] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.930351] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 708.938055] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 708.945313] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 708.952583] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 708.959867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 708.967129] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 [ 709.033002] BTRFS error (device loop2): open_ctree failed [ 709.062670] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (10828) 08:31:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 22) 08:31:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000020000000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c008cffffff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 709.078728] BTRFS error (device loop2): superblock checksum mismatch 08:31:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000500000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 709.222839] BTRFS error (device loop2): open_ctree failed 08:31:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010068ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 709.268546] FAULT_INJECTION: forcing a failure. [ 709.268546] name failslab, interval 1, probability 0, space 0, times 0 [ 709.280106] CPU: 1 PID: 10848 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 709.287989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.297345] Call Trace: [ 709.299923] dump_stack+0x1fc/0x2ef [ 709.303551] should_fail.cold+0xa/0xf [ 709.307352] ? setup_fault_attr+0x200/0x200 [ 709.311668] ? lock_acquire+0x170/0x3c0 [ 709.315632] __should_failslab+0x115/0x180 [ 709.319853] should_failslab+0x5/0x10 [ 709.323648] kmem_cache_alloc_node+0x245/0x3b0 [ 709.328234] __alloc_skb+0x71/0x560 [ 709.331867] alloc_uevent_skb+0x7b/0x210 [ 709.335925] kobject_uevent_env+0xa90/0x1480 [ 709.340340] lo_ioctl+0xff9/0x20e0 [ 709.343883] ? loop_set_status64+0x110/0x110 [ 709.348311] blkdev_ioctl+0x5cb/0x1a80 [ 709.352205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.357578] ? blkpg_ioctl+0x9d0/0x9d0 [ 709.361456] ? mark_held_locks+0xf0/0xf0 [ 709.365518] ? perf_trace_lock_acquire+0xef/0x530 [ 709.370353] ? debug_check_no_obj_freed+0x201/0x490 [ 709.375357] ? HARDIRQ_verbose+0x10/0x10 [ 709.379426] block_ioctl+0xe9/0x130 [ 709.383047] ? blkdev_fallocate+0x3f0/0x3f0 [ 709.387372] do_vfs_ioctl+0xcdb/0x12e0 [ 709.391251] ? lock_downgrade+0x720/0x720 [ 709.395386] ? check_preemption_disabled+0x41/0x280 [ 709.400478] ? ioctl_preallocate+0x200/0x200 [ 709.404886] ? __fget+0x356/0x510 [ 709.408332] ? do_dup2+0x450/0x450 [ 709.411867] ? do_sys_open+0x2bf/0x520 [ 709.415772] ksys_ioctl+0x9b/0xc0 [ 709.419220] __x64_sys_ioctl+0x6f/0xb0 [ 709.423456] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 709.428039] do_syscall_64+0xf9/0x620 [ 709.431840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.437031] RIP: 0033:0x7f99634868a7 [ 709.440733] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 709.459616] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 709.467315] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 709.474584] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 709.481855] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 709.489119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 709.496371] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000105f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 23) 08:31:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0097ffffff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000020000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 709.716773] FAULT_INJECTION: forcing a failure. [ 709.716773] name failslab, interval 1, probability 0, space 0, times 0 [ 709.728375] CPU: 0 PID: 10876 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 709.736277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.745671] Call Trace: [ 709.748268] dump_stack+0x1fc/0x2ef [ 709.751895] should_fail.cold+0xa/0xf [ 709.755696] ? setup_fault_attr+0x200/0x200 [ 709.760003] ? lock_acquire+0x170/0x3c0 [ 709.763976] __should_failslab+0x115/0x180 [ 709.768205] should_failslab+0x5/0x10 [ 709.771992] kmem_cache_alloc_node+0x245/0x3b0 [ 709.776567] __alloc_skb+0x71/0x560 [ 709.780187] alloc_uevent_skb+0x7b/0x210 [ 709.784239] kobject_uevent_env+0xa90/0x1480 [ 709.788652] lo_ioctl+0xff9/0x20e0 [ 709.792184] ? loop_set_status64+0x110/0x110 [ 709.796584] blkdev_ioctl+0x5cb/0x1a80 [ 709.800460] ? blkpg_ioctl+0x9d0/0x9d0 [ 709.804339] ? mark_held_locks+0xf0/0xf0 [ 709.808422] ? perf_trace_lock_acquire+0x36b/0x530 [ 709.813341] ? debug_check_no_obj_freed+0x201/0x490 [ 709.818375] ? HARDIRQ_verbose+0x10/0x10 [ 709.822443] block_ioctl+0xe9/0x130 [ 709.826061] ? blkdev_fallocate+0x3f0/0x3f0 [ 709.830452] do_vfs_ioctl+0xcdb/0x12e0 [ 709.834365] ? lock_downgrade+0x720/0x720 [ 709.838505] ? check_preemption_disabled+0x41/0x280 [ 709.843522] ? ioctl_preallocate+0x200/0x200 [ 709.848033] ? __fget+0x356/0x510 [ 709.851481] ? do_dup2+0x450/0x450 [ 709.855016] ? do_sys_open+0x2bf/0x520 [ 709.858903] ksys_ioctl+0x9b/0xc0 [ 709.862381] __x64_sys_ioctl+0x6f/0xb0 [ 709.866257] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 709.870831] do_syscall_64+0xf9/0x620 [ 709.874647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.879827] RIP: 0033:0x7f99634868a7 [ 709.883529] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 709.902423] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 709.910192] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 709.917472] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 709.924749] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 709.932007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 709.939268] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 [ 709.963351] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10865) [ 709.975832] BTRFS error (device loop2): superblock checksum mismatch [ 710.002728] BTRFS error (device loop2): open_ctree failed [ 710.020316] BTRFS error (device loop2): superblock checksum mismatch 08:31:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 24) 08:31:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000600000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 710.105505] BTRFS error (device loop2): open_ctree failed [ 710.118220] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (10865) [ 710.134034] BTRFS error (device loop2): superblock checksum mismatch 08:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000001006cffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00f5ffffff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 710.190853] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (10888) [ 710.246093] BTRFS error (device loop2): open_ctree failed [ 710.402925] FAULT_INJECTION: forcing a failure. [ 710.402925] name failslab, interval 1, probability 0, space 0, times 0 [ 710.414638] CPU: 1 PID: 10908 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 710.422525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.431879] Call Trace: [ 710.434479] dump_stack+0x1fc/0x2ef [ 710.438107] should_fail.cold+0xa/0xf [ 710.441920] ? setup_fault_attr+0x200/0x200 [ 710.446250] ? lock_acquire+0x170/0x3c0 [ 710.450217] __should_failslab+0x115/0x180 [ 710.454458] should_failslab+0x5/0x10 [ 710.458358] kmem_cache_alloc+0x277/0x370 [ 710.462495] skb_clone+0x151/0x3d0 [ 710.466047] netlink_broadcast_filtered+0x8e5/0xbc0 [ 710.471066] netlink_broadcast+0x35/0x40 [ 710.475132] kobject_uevent_env+0xa56/0x1480 [ 710.479624] lo_ioctl+0xff9/0x20e0 [ 710.483163] ? loop_set_status64+0x110/0x110 [ 710.487558] blkdev_ioctl+0x5cb/0x1a80 [ 710.491434] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.496796] ? blkpg_ioctl+0x9d0/0x9d0 [ 710.500692] ? mark_held_locks+0xf0/0xf0 [ 710.504752] ? perf_trace_lock_acquire+0xef/0x530 [ 710.509587] ? debug_check_no_obj_freed+0x201/0x490 [ 710.514613] ? HARDIRQ_verbose+0x10/0x10 [ 710.518771] block_ioctl+0xe9/0x130 [ 710.522398] ? blkdev_fallocate+0x3f0/0x3f0 [ 710.526715] do_vfs_ioctl+0xcdb/0x12e0 [ 710.530588] ? lock_downgrade+0x720/0x720 [ 710.534731] ? check_preemption_disabled+0x41/0x280 [ 710.539742] ? ioctl_preallocate+0x200/0x200 [ 710.544138] ? __fget+0x356/0x510 [ 710.547579] ? do_dup2+0x450/0x450 [ 710.551103] ? do_sys_open+0x2bf/0x520 [ 710.554996] ksys_ioctl+0x9b/0xc0 [ 710.558454] __x64_sys_ioctl+0x6f/0xb0 [ 710.562338] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 710.566906] do_syscall_64+0xf9/0x620 [ 710.570710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.575902] RIP: 0033:0x7f99634868a7 [ 710.579620] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 710.598520] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 710.606222] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 710.613492] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 710.620774] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 710.628043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 710.635309] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 [ 710.679570] BTRFS error (device loop2): superblock checksum mismatch 08:31:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 25) 08:31:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000030000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 710.753643] BTRFS error (device loop2): open_ctree failed [ 710.771918] BTRFS error (device loop2): superblock checksum mismatch 08:31:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 710.794393] BTRFS error (device loop2): open_ctree failed [ 710.834232] BTRFS error (device loop2): superblock checksum mismatch [ 710.886205] FAULT_INJECTION: forcing a failure. [ 710.886205] name failslab, interval 1, probability 0, space 0, times 0 [ 710.898009] CPU: 0 PID: 10948 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 710.905893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.915246] Call Trace: [ 710.917840] dump_stack+0x1fc/0x2ef [ 710.921588] should_fail.cold+0xa/0xf [ 710.925408] ? setup_fault_attr+0x200/0x200 [ 710.929745] ? lock_acquire+0x170/0x3c0 [ 710.933728] __should_failslab+0x115/0x180 [ 710.938106] should_failslab+0x5/0x10 [ 710.941920] kmem_cache_alloc_trace+0x284/0x380 [ 710.946596] ? wait_for_completion_io+0x10/0x10 [ 710.951258] ? kobj_ns_initial+0x90/0x90 [ 710.955323] call_usermodehelper_setup+0x84/0x300 [ 710.960191] kobject_uevent_env+0xe83/0x1480 [ 710.964636] lo_ioctl+0xff9/0x20e0 [ 710.968172] ? loop_set_status64+0x110/0x110 [ 710.972578] blkdev_ioctl+0x5cb/0x1a80 [ 710.976475] ? blkpg_ioctl+0x9d0/0x9d0 [ 710.980377] ? mark_held_locks+0xf0/0xf0 [ 710.984438] ? perf_trace_lock_acquire+0x36b/0x530 [ 710.989470] ? debug_check_no_obj_freed+0x201/0x490 [ 710.994496] ? HARDIRQ_verbose+0x10/0x10 [ 710.998586] block_ioctl+0xe9/0x130 [ 711.002228] ? blkdev_fallocate+0x3f0/0x3f0 [ 711.006555] do_vfs_ioctl+0xcdb/0x12e0 [ 711.010443] ? lock_downgrade+0x720/0x720 [ 711.014584] ? check_preemption_disabled+0x41/0x280 [ 711.019621] ? ioctl_preallocate+0x200/0x200 [ 711.024052] ? __fget+0x356/0x510 [ 711.027529] ? do_dup2+0x450/0x450 [ 711.031076] ? do_sys_open+0x2bf/0x520 [ 711.034970] ksys_ioctl+0x9b/0xc0 [ 711.038432] __x64_sys_ioctl+0x6f/0xb0 [ 711.042328] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 711.046972] do_syscall_64+0xf9/0x620 [ 711.050780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.056021] RIP: 0033:0x7f99634868a7 [ 711.059736] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 711.078633] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 711.086343] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 711.093620] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 711.100899] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 711.108172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 711.115449] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 08:31:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000700000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 711.172314] BTRFS error (device loop2): open_ctree failed [ 711.180160] BTRFS error (device loop2): superblock checksum mismatch 08:31:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 26) [ 711.242523] BTRFS error (device loop2): open_ctree failed [ 711.251415] BTRFS error (device loop2): superblock checksum mismatch [ 711.313661] BTRFS error (device loop2): open_ctree failed [ 711.336410] BTRFS error (device loop2): superblock checksum mismatch 08:31:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00f6ffffff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010074ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000040000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 711.363021] BTRFS error (device loop2): open_ctree failed [ 711.380172] BTRFS error (device loop2): superblock checksum mismatch [ 711.450887] FAULT_INJECTION: forcing a failure. [ 711.450887] name failslab, interval 1, probability 0, space 0, times 0 [ 711.466339] CPU: 1 PID: 10978 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 711.474277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.483641] Call Trace: [ 711.486239] dump_stack+0x1fc/0x2ef [ 711.489866] should_fail.cold+0xa/0xf [ 711.493673] ? setup_fault_attr+0x200/0x200 [ 711.497999] ? lock_acquire+0x170/0x3c0 [ 711.501983] __should_failslab+0x115/0x180 [ 711.506227] should_failslab+0x5/0x10 [ 711.510026] kmem_cache_alloc_trace+0x284/0x380 [ 711.514761] ? wait_for_completion_io+0x10/0x10 [ 711.519493] ? kobj_ns_initial+0x90/0x90 [ 711.523572] call_usermodehelper_setup+0x84/0x300 [ 711.528433] kobject_uevent_env+0xe83/0x1480 [ 711.532850] lo_ioctl+0xff9/0x20e0 [ 711.536479] ? loop_set_status64+0x110/0x110 [ 711.540876] blkdev_ioctl+0x5cb/0x1a80 [ 711.544764] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.550122] ? blkpg_ioctl+0x9d0/0x9d0 [ 711.554126] ? mark_held_locks+0xf0/0xf0 [ 711.558177] ? perf_trace_lock_acquire+0xef/0x530 [ 711.563017] ? debug_check_no_obj_freed+0x201/0x490 [ 711.568046] ? HARDIRQ_verbose+0x10/0x10 [ 711.572111] block_ioctl+0xe9/0x130 [ 711.575732] ? blkdev_fallocate+0x3f0/0x3f0 [ 711.580061] do_vfs_ioctl+0xcdb/0x12e0 [ 711.583959] ? lock_downgrade+0x720/0x720 [ 711.588113] ? check_preemption_disabled+0x41/0x280 [ 711.593133] ? ioctl_preallocate+0x200/0x200 [ 711.597567] ? __fget+0x356/0x510 [ 711.601042] ? do_dup2+0x450/0x450 [ 711.604581] ? do_sys_open+0x2bf/0x520 [ 711.608483] ksys_ioctl+0x9b/0xc0 [ 711.611946] __x64_sys_ioctl+0x6f/0xb0 [ 711.615827] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 711.620394] do_syscall_64+0xf9/0x620 [ 711.624235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.629427] RIP: 0033:0x7f99634868a7 [ 711.633137] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 711.652028] RSP: 002b:00007f99609fbf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 711.659732] RAX: ffffffffffffffda RBX: 00007f99634d0970 RCX: 00007f99634868a7 [ 711.666993] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 711.674256] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 711.681551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 711.688822] R13: 0000000000000005 R14: 00000000200009d8 R15: 0000000000000001 [ 711.699588] BTRFS error (device loop2): open_ctree failed 08:31:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000020800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00fdffffff00000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 27) [ 712.008967] FAULT_INJECTION: forcing a failure. [ 712.008967] name failslab, interval 1, probability 0, space 0, times 0 [ 712.028705] CPU: 0 PID: 11007 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 712.036628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.046015] Call Trace: [ 712.048629] dump_stack+0x1fc/0x2ef [ 712.052288] should_fail.cold+0xa/0xf [ 712.056120] ? setup_fault_attr+0x200/0x200 [ 712.060456] ? lock_acquire+0x170/0x3c0 [ 712.064448] __should_failslab+0x115/0x180 [ 712.068690] should_failslab+0x5/0x10 [ 712.072491] kmem_cache_alloc+0x277/0x370 [ 712.076659] getname_flags+0xce/0x590 [ 712.080465] do_mkdirat+0x8d/0x2d0 [ 712.084006] ? __ia32_sys_mknod+0x120/0x120 [ 712.088332] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 712.093711] ? trace_hardirqs_off_caller+0x6e/0x210 [ 712.098730] ? do_syscall_64+0x21/0x620 [ 712.102712] do_syscall_64+0xf9/0x620 [ 712.106516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.111700] RIP: 0033:0x7f9963485bf7 [ 712.115410] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 712.134394] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 712.142112] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963485bf7 [ 712.149377] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 08:31:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000050000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 712.156697] RBP: 00007f99609fc040 R08: 0000000000000000 R09: ffffffffffffffff [ 712.163965] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 712.171231] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 712.257305] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11006) [ 712.276732] BTRFS error (device loop2): superblock checksum mismatch 08:31:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 28) [ 712.386085] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11018) [ 712.414948] FAULT_INJECTION: forcing a failure. [ 712.414948] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 712.426781] CPU: 1 PID: 11040 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 712.434678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.444038] Call Trace: [ 712.446637] dump_stack+0x1fc/0x2ef [ 712.449677] BTRFS error (device loop2): open_ctree failed [ 712.450280] should_fail.cold+0xa/0xf [ 712.459601] ? setup_fault_attr+0x200/0x200 [ 712.461981] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11032) [ 712.463937] ? __mutex_unlock_slowpath+0xea/0x610 [ 712.463960] __alloc_pages_nodemask+0x239/0x2890 [ 712.463989] ? __lock_acquire+0x6de/0x3ff0 [ 712.464011] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 712.464025] ? blkdev_ioctl+0x11a/0x1a80 [ 712.464039] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.464054] ? blkpg_ioctl+0x9d0/0x9d0 [ 712.507697] ? perf_trace_lock_acquire+0xef/0x530 [ 712.512553] ? perf_trace_lock_acquire+0xef/0x530 [ 712.517407] ? HARDIRQ_verbose+0x10/0x10 [ 712.521456] ? HARDIRQ_verbose+0x10/0x10 [ 712.525518] cache_grow_begin+0xa4/0x8a0 [ 712.529579] ? setup_fault_attr+0x200/0x200 [ 712.533923] ? lock_acquire+0x170/0x3c0 [ 712.537891] cache_alloc_refill+0x273/0x340 [ 712.542214] kmem_cache_alloc+0x346/0x370 [ 712.546357] getname_flags+0xce/0x590 [ 712.550150] do_mkdirat+0x8d/0x2d0 [ 712.553683] ? __ia32_sys_mknod+0x120/0x120 [ 712.558002] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 712.563359] ? trace_hardirqs_off_caller+0x6e/0x210 [ 712.568366] ? do_syscall_64+0x21/0x620 [ 712.572332] do_syscall_64+0xf9/0x620 [ 712.576125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.581305] RIP: 0033:0x7f9963485bf7 [ 712.585009] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 712.603912] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 712.611609] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963485bf7 [ 712.618866] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 712.626125] RBP: 00007f99609fc040 R08: 0000000000000000 R09: ffffffffffffffff 08:31:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000030800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 712.633392] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 712.640654] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 712.657006] BTRFS error (device loop2): superblock checksum mismatch 08:31:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000007000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000060000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 29) [ 712.737517] BTRFS error (device loop2): open_ctree failed [ 712.770511] BTRFS error (device loop2): superblock checksum mismatch 08:31:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000001007affffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 712.804441] BTRFS error (device loop2): open_ctree failed 08:31:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07030000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 712.854119] FAULT_INJECTION: forcing a failure. [ 712.854119] name failslab, interval 1, probability 0, space 0, times 0 [ 712.884039] CPU: 0 PID: 11065 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 712.891965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.901337] Call Trace: 08:31:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000040800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 712.903948] dump_stack+0x1fc/0x2ef [ 712.907604] should_fail.cold+0xa/0xf [ 712.911431] ? setup_fault_attr+0x200/0x200 [ 712.915791] __should_failslab+0x115/0x180 [ 712.920074] should_failslab+0x5/0x10 [ 712.923893] kmem_cache_alloc+0x277/0x370 [ 712.928057] ? ext4_sync_fs+0x8d0/0x8d0 [ 712.932053] ext4_alloc_inode+0x1a/0x630 [ 712.936215] ? ext4_sync_fs+0x8d0/0x8d0 [ 712.940202] alloc_inode+0x5d/0x180 [ 712.943843] new_inode+0x1d/0xf0 [ 712.947314] __ext4_new_inode+0x400/0x5a20 [ 712.951576] ? putname+0xe1/0x120 [ 712.955031] ? do_mkdirat+0xa0/0x2d0 [ 712.958861] ? HARDIRQ_verbose+0x10/0x10 [ 712.962917] ? ext4_free_inode+0x1780/0x1780 [ 712.967315] ? debug_check_no_obj_freed+0x201/0x490 [ 712.972326] ? __dquot_initialize+0x298/0xb70 [ 712.976951] ? lock_acquire+0x170/0x3c0 [ 712.980998] ? dquot_initialize_needed+0x290/0x290 [ 712.985948] ? trace_hardirqs_off+0x64/0x200 [ 712.990350] ? common_perm+0x4be/0x800 [ 712.994234] ext4_mkdir+0x396/0xe10 [ 712.997858] ? putname+0xe1/0x120 [ 713.001320] ? ext4_init_dot_dotdot+0x600/0x600 [ 713.005995] ? generic_permission+0x116/0x4d0 [ 713.010535] ? security_inode_permission+0xc5/0xf0 [ 713.015558] ? inode_permission.part.0+0x10c/0x450 [ 713.020494] vfs_mkdir+0x508/0x7a0 [ 713.024055] do_mkdirat+0x262/0x2d0 [ 713.027706] ? __ia32_sys_mknod+0x120/0x120 [ 713.032029] ? trace_hardirqs_off_caller+0x6e/0x210 [ 713.037039] ? do_syscall_64+0x21/0x620 [ 713.041006] do_syscall_64+0xf9/0x620 [ 713.044804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.049995] RIP: 0033:0x7f9963485bf7 [ 713.053712] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 713.072737] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 713.080455] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963485bf7 [ 713.087735] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 713.095059] RBP: 00007f99609fc040 R08: 0000000000000000 R09: ffffffffffffffff [ 713.102327] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 713.109602] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 30) [ 713.189628] BTRFS error (device loop2): superblock checksum mismatch [ 713.196721] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11074) 08:31:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000000000000d000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 713.253437] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11073) [ 713.291164] FAULT_INJECTION: forcing a failure. [ 713.291164] name failslab, interval 1, probability 0, space 0, times 0 08:31:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010fffffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 713.303442] CPU: 0 PID: 11097 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 713.311341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.320708] Call Trace: [ 713.323332] dump_stack+0x1fc/0x2ef [ 713.326992] should_fail.cold+0xa/0xf [ 713.330812] ? setup_fault_attr+0x200/0x200 [ 713.335151] ? perf_trace_lock_acquire+0x36b/0x530 [ 713.340105] ? __es_tree_search.isra.0+0x1af/0x210 [ 713.345068] __should_failslab+0x115/0x180 [ 713.349325] should_failslab+0x5/0x10 [ 713.353143] kmem_cache_alloc+0x3f/0x370 [ 713.357226] __es_insert_extent+0x39b/0x13b0 [ 713.361654] ? lock_acquire+0x170/0x3c0 [ 713.365642] ? ext4_es_insert_extent+0x17e/0x5e0 [ 713.370431] ext4_es_insert_extent+0x22e/0x5e0 [ 713.375144] ? lock_downgrade+0x720/0x720 [ 713.379307] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 713.385136] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 713.390169] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 713.395993] ext4_ext_map_blocks+0x2129/0x7390 [ 713.400603] ? __lock_acquire+0x6de/0x3ff0 [ 713.404867] ? __lock_acquire+0x6de/0x3ff0 [ 713.409121] ? perf_trace_run_bpf_submit+0x144/0x220 [ 713.414252] ? check_preemption_disabled+0x41/0x280 [ 713.419272] ? perf_trace_run_bpf_submit+0x144/0x220 [ 713.424375] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 713.429575] ? mark_held_locks+0xf0/0xf0 [ 713.433639] ? perf_trace_lock_acquire+0x36b/0x530 [ 713.438651] ? HARDIRQ_verbose+0x10/0x10 [ 713.442743] ? check_preemption_disabled+0x41/0x280 [ 713.447772] ? lock_acquire+0x170/0x3c0 [ 713.451762] ? ext4_map_blocks+0x33e/0x1a50 [ 713.456104] ext4_map_blocks+0xd88/0x1a50 [ 713.460259] ? check_preemption_disabled+0x41/0x280 [ 713.465297] ? ext4_issue_zeroout+0x160/0x160 [ 713.469802] ? __brelse+0x84/0xa0 [ 713.473286] ? __ext4_new_inode+0x2eb/0x5a20 [ 713.477704] ext4_getblk+0xad/0x4f0 [ 713.481337] ? ext4_iomap_begin+0xe00/0xe00 [ 713.485665] ? ext4_free_inode+0x1780/0x1780 [ 713.490069] ? debug_check_no_obj_freed+0x201/0x490 [ 713.495114] ? __dquot_initialize+0x298/0xb70 [ 713.499612] ext4_bread+0x7c/0x210 [ 713.503161] ? ext4_getblk+0x4f0/0x4f0 [ 713.507051] ? dquot_initialize_needed+0x290/0x290 [ 713.511979] ? trace_hardirqs_off+0x64/0x200 [ 713.516388] ext4_append+0x155/0x370 [ 713.520118] ext4_mkdir+0x5bd/0xe10 [ 713.523756] ? ext4_init_dot_dotdot+0x600/0x600 [ 713.528434] ? generic_permission+0x116/0x4d0 [ 713.532930] ? inode_permission.part.0+0x10c/0x450 [ 713.537869] vfs_mkdir+0x508/0x7a0 [ 713.541410] do_mkdirat+0x262/0x2d0 [ 713.545036] ? __ia32_sys_mknod+0x120/0x120 [ 713.549355] ? trace_hardirqs_off_caller+0x6e/0x210 [ 713.554363] ? do_syscall_64+0x21/0x620 [ 713.558347] do_syscall_64+0xf9/0x620 [ 713.562151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.567332] RIP: 0033:0x7f9963485bf7 [ 713.571041] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 713.589934] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 713.597639] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963485bf7 [ 713.604899] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 713.612162] RBP: 00007f99609fc040 R08: 0000000000000000 R09: ffffffffffffffff [ 713.619424] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 713.626693] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000070000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 713.651097] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11084) [ 713.684386] BTRFS error (device loop2): open_ctree failed [ 713.696039] BTRFS error (device loop2): superblock checksum mismatch [ 713.741770] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11104) 08:31:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000050800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000080000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000000007fffffff000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000b8ffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 31) [ 713.964117] BTRFS error (device loop2): open_ctree failed 08:31:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000060800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 714.186115] FAULT_INJECTION: forcing a failure. [ 714.186115] name failslab, interval 1, probability 0, space 0, times 0 [ 714.197629] CPU: 0 PID: 11150 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 714.205521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.214887] Call Trace: [ 714.217482] dump_stack+0x1fc/0x2ef [ 714.221126] should_fail.cold+0xa/0xf [ 714.224931] ? setup_fault_attr+0x200/0x200 [ 714.229250] ? perf_trace_lock_acquire+0x36b/0x530 [ 714.234187] ? __es_tree_search.isra.0+0x1af/0x210 [ 714.239122] __should_failslab+0x115/0x180 [ 714.243360] should_failslab+0x5/0x10 [ 714.247163] kmem_cache_alloc+0x3f/0x370 [ 714.251224] __es_insert_extent+0x39b/0x13b0 [ 714.255629] ? lock_acquire+0x170/0x3c0 [ 714.259596] ? ext4_es_insert_extent+0x17e/0x5e0 [ 714.264367] ext4_es_insert_extent+0x22e/0x5e0 [ 714.268980] ? lock_downgrade+0x720/0x720 [ 714.273135] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 714.278947] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 714.283966] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 714.289790] ext4_ext_map_blocks+0x2129/0x7390 [ 714.294376] ? __lock_acquire+0x6de/0x3ff0 [ 714.298621] ? __lock_acquire+0x6de/0x3ff0 [ 714.302872] ? perf_trace_run_bpf_submit+0x144/0x220 [ 714.307970] ? check_preemption_disabled+0x41/0x280 [ 714.312986] ? perf_trace_run_bpf_submit+0x144/0x220 [ 714.318086] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 714.323271] ? mark_held_locks+0xf0/0xf0 [ 714.327330] ? perf_trace_lock_acquire+0x36b/0x530 [ 714.332267] ? HARDIRQ_verbose+0x10/0x10 [ 714.336334] ? check_preemption_disabled+0x41/0x280 [ 714.341361] ? lock_acquire+0x170/0x3c0 [ 714.345331] ? ext4_map_blocks+0x33e/0x1a50 [ 714.349660] ext4_map_blocks+0xd88/0x1a50 [ 714.353807] ? check_preemption_disabled+0x41/0x280 [ 714.358823] ? ext4_issue_zeroout+0x160/0x160 [ 714.363324] ? __brelse+0x84/0xa0 [ 714.366775] ? __ext4_new_inode+0x2eb/0x5a20 [ 714.371202] ext4_getblk+0xad/0x4f0 [ 714.374840] ? ext4_iomap_begin+0xe00/0xe00 [ 714.379164] ? ext4_free_inode+0x1780/0x1780 [ 714.383569] ? __dquot_initialize+0x298/0xb70 [ 714.388071] ext4_bread+0x7c/0x210 [ 714.391610] ? ext4_getblk+0x4f0/0x4f0 [ 714.395490] ? dquot_initialize_needed+0x290/0x290 [ 714.400423] ? rcu_nmi_exit+0xb3/0x180 [ 714.404323] ext4_append+0x155/0x370 [ 714.408046] ext4_mkdir+0x5bd/0xe10 [ 714.411680] ? ext4_init_dot_dotdot+0x600/0x600 [ 714.416356] ? generic_permission+0x116/0x4d0 [ 714.420851] ? inode_permission.part.0+0x10c/0x450 [ 714.425798] vfs_mkdir+0x508/0x7a0 [ 714.429358] do_mkdirat+0x262/0x2d0 [ 714.432996] ? __ia32_sys_mknod+0x120/0x120 [ 714.437335] ? trace_hardirqs_off_caller+0x6e/0x210 [ 714.442371] ? do_syscall_64+0x21/0x620 [ 714.446350] do_syscall_64+0xf9/0x620 [ 714.450157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.455341] RIP: 0033:0x7f9963485bf7 [ 714.459049] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.477957] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 08:31:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000002000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 714.485665] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963485bf7 [ 714.493041] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 714.500313] RBP: 00007f99609fc040 R08: 0000000000000000 R09: ffffffffffffffff [ 714.507589] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 714.514866] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 714.559870] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11141) [ 714.572630] BTRFS error (device loop2): superblock checksum mismatch 08:31:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000090000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 714.620788] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11160) 08:31:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 32) 08:31:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000070800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 714.716888] BTRFS error (device loop2): open_ctree failed [ 714.723214] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11172) [ 714.740195] BTRFS error (device loop2): superblock checksum mismatch 08:31:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010002ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000003000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 714.793049] BTRFS error (device loop2): open_ctree failed [ 714.883333] FAULT_INJECTION: forcing a failure. [ 714.883333] name failslab, interval 1, probability 0, space 0, times 0 [ 714.902617] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11194) [ 714.931377] BTRFS error (device loop2): superblock checksum mismatch [ 714.995341] BTRFS error (device loop2): open_ctree failed [ 714.997664] CPU: 0 PID: 11190 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 715.008793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.018146] Call Trace: [ 715.020739] dump_stack+0x1fc/0x2ef [ 715.024371] should_fail.cold+0xa/0xf [ 715.028173] ? setup_fault_attr+0x200/0x200 [ 715.032507] ? lock_downgrade+0x720/0x720 [ 715.036663] __should_failslab+0x115/0x180 [ 715.040907] should_failslab+0x5/0x10 [ 715.044718] __kmalloc+0x2ab/0x3c0 [ 715.048258] ? ext4_find_extent+0x9bb/0xc70 [ 715.052580] ext4_find_extent+0x9bb/0xc70 [ 715.056743] ext4_ext_map_blocks+0x1c0/0x7390 [ 715.061254] ? __lock_acquire+0x6de/0x3ff0 [ 715.065501] ? mark_held_locks+0xf0/0xf0 [ 715.069566] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 715.074759] ? perf_trace_lock_acquire+0xef/0x530 [ 715.079596] ? perf_trace_lock_acquire+0xef/0x530 [ 715.084440] ? HARDIRQ_verbose+0x10/0x10 [ 715.088499] ? HARDIRQ_verbose+0x10/0x10 [ 715.092560] ? ext4_map_blocks+0x59f/0x1a50 [ 715.096883] ? lock_acquire+0x170/0x3c0 [ 715.100851] ? ext4_map_blocks+0x740/0x1a50 [ 715.105184] ext4_map_blocks+0x7a2/0x1a50 [ 715.109338] ? check_preemption_disabled+0x41/0x280 [ 715.114353] ? ext4_issue_zeroout+0x160/0x160 [ 715.118844] ? __brelse+0x84/0xa0 [ 715.122293] ? __ext4_new_inode+0x2eb/0x5a20 [ 715.126712] ext4_getblk+0xad/0x4f0 [ 715.130338] ? ext4_iomap_begin+0xe00/0xe00 [ 715.134657] ? ext4_free_inode+0x1780/0x1780 [ 715.139063] ? debug_check_no_obj_freed+0x201/0x490 [ 715.144071] ? __dquot_initialize+0x298/0xb70 [ 715.148567] ext4_bread+0x7c/0x210 [ 715.152102] ? ext4_getblk+0x4f0/0x4f0 [ 715.155993] ? dquot_initialize_needed+0x290/0x290 [ 715.160937] ? trace_hardirqs_off+0x64/0x200 [ 715.165348] ext4_append+0x155/0x370 [ 715.169065] ext4_mkdir+0x5bd/0xe10 [ 715.172764] ? ext4_init_dot_dotdot+0x600/0x600 [ 715.177431] ? generic_permission+0x116/0x4d0 [ 715.181931] ? inode_permission.part.0+0x10c/0x450 [ 715.186861] vfs_mkdir+0x508/0x7a0 [ 715.190399] do_mkdirat+0x262/0x2d0 [ 715.194025] ? __ia32_sys_mknod+0x120/0x120 [ 715.198348] ? trace_hardirqs_off_caller+0x6e/0x210 [ 715.203365] ? do_syscall_64+0x21/0x620 [ 715.207353] do_syscall_64+0xf9/0x620 [ 715.211155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.216350] RIP: 0033:0x7f9963485bf7 [ 715.220070] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 715.238977] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 715.246682] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963485bf7 [ 715.253946] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 715.261208] RBP: 00007f99609fc040 R08: 0000000000000000 R09: ffffffffffffffff [ 715.268473] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 715.275733] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000080800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 715.372387] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11212) 08:31:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000100000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 33) [ 715.480661] BTRFS error (device loop2): superblock checksum mismatch [ 715.546664] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11214) [ 715.580065] FAULT_INJECTION: forcing a failure. [ 715.580065] name failslab, interval 1, probability 0, space 0, times 0 [ 715.591395] CPU: 1 PID: 11231 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 715.599286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.608645] Call Trace: [ 715.611244] dump_stack+0x1fc/0x2ef [ 715.614893] should_fail.cold+0xa/0xf [ 715.618709] ? setup_fault_attr+0x200/0x200 [ 715.623042] ? perf_trace_lock_acquire+0xef/0x530 [ 715.627890] ? __es_tree_search.isra.0+0x1af/0x210 [ 715.632833] __should_failslab+0x115/0x180 [ 715.637077] should_failslab+0x5/0x10 [ 715.640883] kmem_cache_alloc+0x3f/0x370 [ 715.644955] __es_insert_extent+0x39b/0x13b0 [ 715.649384] ext4_es_insert_extent+0x22e/0x5e0 [ 715.653975] ? ext4_map_blocks+0x59f/0x1a50 [ 715.658287] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 715.664084] ext4_map_blocks+0xa2a/0x1a50 [ 715.668228] ? ext4_issue_zeroout+0x160/0x160 [ 715.672724] ? __brelse+0x84/0xa0 [ 715.676166] ? __ext4_new_inode+0x2eb/0x5a20 [ 715.680575] ext4_getblk+0xad/0x4f0 [ 715.684196] ? ext4_iomap_begin+0xe00/0xe00 [ 715.688505] ? ext4_free_inode+0x1780/0x1780 [ 715.692901] ? debug_check_no_obj_freed+0x201/0x490 [ 715.697906] ? __dquot_initialize+0x298/0xb70 [ 715.702391] ext4_bread+0x7c/0x210 [ 715.705925] ? ext4_getblk+0x4f0/0x4f0 [ 715.709802] ? dquot_initialize_needed+0x290/0x290 [ 715.714719] ? trace_hardirqs_off+0x64/0x200 [ 715.719117] ext4_append+0x155/0x370 [ 715.722826] ext4_mkdir+0x5bd/0xe10 [ 715.726445] ? ext4_init_dot_dotdot+0x600/0x600 [ 715.731121] ? generic_permission+0x116/0x4d0 [ 715.735613] ? inode_permission.part.0+0x10c/0x450 [ 715.740531] vfs_mkdir+0x508/0x7a0 [ 715.744061] do_mkdirat+0x262/0x2d0 [ 715.747675] ? __ia32_sys_mknod+0x120/0x120 [ 715.751985] ? trace_hardirqs_off_caller+0x6e/0x210 [ 715.756988] ? do_syscall_64+0x21/0x620 [ 715.760952] do_syscall_64+0xf9/0x620 [ 715.764744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.769921] RIP: 0033:0x7f9963485bf7 [ 715.773633] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:31:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000230000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 715.792528] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 715.800223] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963485bf7 [ 715.807479] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 715.814735] RBP: 00007f99609fc040 R08: 0000000000000000 R09: ffffffffffffffff [ 715.821991] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 715.829245] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000004000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 715.961618] BTRFS error (device loop2): open_ctree failed [ 715.970008] BTRFS error (device loop2): superblock checksum mismatch [ 716.009738] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11214) 08:31:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 34) 08:31:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010003ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 716.082267] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11240) 08:31:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 716.156871] BTRFS error (device loop2): open_ctree failed [ 716.243048] FAULT_INJECTION: forcing a failure. [ 716.243048] name failslab, interval 1, probability 0, space 0, times 0 [ 716.256445] CPU: 1 PID: 11259 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 716.264342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.273690] Call Trace: [ 716.276265] dump_stack+0x1fc/0x2ef [ 716.279939] should_fail.cold+0xa/0xf [ 716.283740] ? setup_fault_attr+0x200/0x200 [ 716.288096] ? lock_downgrade+0x720/0x720 [ 716.292257] ? check_preemption_disabled+0x41/0x280 [ 716.297288] __should_failslab+0x115/0x180 [ 716.301538] should_failslab+0x5/0x10 [ 716.305346] kmem_cache_alloc+0x277/0x370 [ 716.309502] ext4_mb_new_blocks+0x60a/0x4370 [ 716.313951] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 716.318977] ? ext4_cache_extents+0x68/0x2d0 [ 716.323399] ? ext4_find_extent+0x9bb/0xc70 [ 716.327729] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 716.333009] ? ext4_ext_search_right+0x2c7/0xb60 [ 716.337778] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 716.342807] ext4_ext_map_blocks+0x2aa2/0x7390 [ 716.347414] ? __lock_acquire+0x6de/0x3ff0 [ 716.351655] ? perf_trace_run_bpf_submit+0x144/0x220 [ 716.356753] ? check_preemption_disabled+0x41/0x280 [ 716.361770] ? perf_trace_run_bpf_submit+0x144/0x220 [ 716.366877] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 716.372054] ? perf_trace_lock_acquire+0x36b/0x530 [ 716.376998] ? HARDIRQ_verbose+0x10/0x10 [ 716.381075] ? HARDIRQ_verbose+0x10/0x10 [ 716.385140] ? ext4_map_blocks+0x59f/0x1a50 [ 716.389477] ext4_map_blocks+0x7a2/0x1a50 [ 716.393618] ? check_preemption_disabled+0x41/0x280 [ 716.398633] ? ext4_issue_zeroout+0x160/0x160 [ 716.403118] ? __brelse+0x84/0xa0 [ 716.406575] ? __ext4_new_inode+0x2eb/0x5a20 [ 716.410971] ext4_getblk+0xad/0x4f0 [ 716.414589] ? ext4_iomap_begin+0xe00/0xe00 [ 716.418896] ? ext4_free_inode+0x1780/0x1780 [ 716.423287] ? debug_check_no_obj_freed+0x201/0x490 [ 716.428315] ? __dquot_initialize+0x298/0xb70 [ 716.432821] ext4_bread+0x7c/0x210 [ 716.436365] ? ext4_getblk+0x4f0/0x4f0 [ 716.440244] ? dquot_initialize_needed+0x290/0x290 [ 716.445163] ? trace_hardirqs_off+0x64/0x200 [ 716.449558] ext4_append+0x155/0x370 [ 716.453257] ext4_mkdir+0x5bd/0xe10 [ 716.456876] ? ext4_init_dot_dotdot+0x600/0x600 [ 716.461600] ? generic_permission+0x116/0x4d0 [ 716.466083] ? inode_permission.part.0+0x10c/0x450 [ 716.471007] vfs_mkdir+0x508/0x7a0 [ 716.474544] do_mkdirat+0x262/0x2d0 [ 716.478160] ? __ia32_sys_mknod+0x120/0x120 [ 716.482529] ? trace_hardirqs_off_caller+0x6e/0x210 [ 716.487539] ? do_syscall_64+0x21/0x620 [ 716.491609] do_syscall_64+0xf9/0x620 [ 716.495399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.500570] RIP: 0033:0x7f9963485bf7 [ 716.504269] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 716.523220] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 716.530932] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f9963485bf7 08:31:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000600000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 716.538188] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 716.545453] RBP: 00007f99609fc040 R08: 0000000000000000 R09: ffffffffffffffff [ 716.552749] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 716.560013] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 716.646609] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11273) [ 716.661825] BTRFS error (device loop2): superblock checksum mismatch 08:31:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 35) 08:31:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000000b0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 716.690042] BTRFS error (device loop2): open_ctree failed [ 716.698962] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11281) [ 716.719219] BTRFS error (device loop2): superblock checksum mismatch 08:31:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000005000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000700000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 716.833805] FAULT_INJECTION: forcing a failure. [ 716.833805] name failslab, interval 1, probability 0, space 0, times 0 [ 716.854637] BTRFS error (device loop2): open_ctree failed [ 716.904532] CPU: 1 PID: 11295 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 716.912525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.921878] Call Trace: [ 716.924540] dump_stack+0x1fc/0x2ef [ 716.928162] should_fail.cold+0xa/0xf [ 716.931960] ? setup_fault_attr+0x200/0x200 [ 716.936285] ? lock_acquire+0x170/0x3c0 [ 716.940264] __should_failslab+0x115/0x180 [ 716.944501] should_failslab+0x5/0x10 [ 716.948295] __kmalloc_track_caller+0x2a6/0x3c0 [ 716.952957] ? strndup_user+0x70/0x120 [ 716.956889] memdup_user+0x22/0xb0 [ 716.960420] strndup_user+0x70/0x120 [ 716.964122] ksys_mount+0x34/0x130 [ 716.967667] __x64_sys_mount+0xba/0x150 [ 716.971639] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 716.976206] do_syscall_64+0xf9/0x620 [ 716.980017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.985201] RIP: 0033:0x7f996348801a [ 716.988910] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.007819] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 717.015539] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 717.022803] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 717.030063] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 717.037331] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 717.044602] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010004ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 36) [ 717.236979] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11306) [ 717.250102] BTRFS error (device loop2): superblock checksum mismatch [ 717.272462] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11313) [ 717.285218] BTRFS error (device loop2): open_ctree failed [ 717.290730] FAULT_INJECTION: forcing a failure. [ 717.290730] name failslab, interval 1, probability 0, space 0, times 0 [ 717.296546] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11321) [ 717.316546] BTRFS error (device loop2): superblock checksum mismatch [ 717.325574] CPU: 1 PID: 11327 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 717.333467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.342829] Call Trace: [ 717.345437] dump_stack+0x1fc/0x2ef [ 717.349062] should_fail.cold+0xa/0xf [ 717.352858] ? setup_fault_attr+0x200/0x200 [ 717.357171] ? lock_acquire+0x170/0x3c0 [ 717.361144] __should_failslab+0x115/0x180 [ 717.365379] should_failslab+0x5/0x10 [ 717.369170] __kmalloc_track_caller+0x2a6/0x3c0 [ 717.373847] ? strndup_user+0x70/0x120 [ 717.377723] ? _copy_from_user+0xd2/0x130 [ 717.381865] memdup_user+0x22/0xb0 [ 717.385396] strndup_user+0x70/0x120 [ 717.389106] ksys_mount+0x6f/0x130 [ 717.392661] __x64_sys_mount+0xba/0x150 [ 717.396648] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 717.401220] do_syscall_64+0xf9/0x620 [ 717.405041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.410231] RIP: 0033:0x7f996348801a [ 717.413943] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.432924] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 717.440622] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 717.447967] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 717.455223] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 717.462483] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 717.469741] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000f00000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 717.587415] BTRFS error (device loop2): open_ctree failed 08:31:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000006000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 37) 08:31:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000100800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010005ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 717.850754] FAULT_INJECTION: forcing a failure. [ 717.850754] name failslab, interval 1, probability 0, space 0, times 0 [ 717.887504] CPU: 0 PID: 11352 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 717.895477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.904833] Call Trace: [ 717.907418] dump_stack+0x1fc/0x2ef [ 717.911042] should_fail.cold+0xa/0xf [ 717.914838] ? setup_fault_attr+0x200/0x200 [ 717.919150] ? lock_acquire+0x170/0x3c0 [ 717.923140] __should_failslab+0x115/0x180 [ 717.927371] should_failslab+0x5/0x10 [ 717.931232] kmem_cache_alloc_trace+0x284/0x380 [ 717.935911] ? _copy_from_user+0xd2/0x130 [ 717.940058] copy_mount_options+0x59/0x380 [ 717.944293] ksys_mount+0x9b/0x130 [ 717.947882] __x64_sys_mount+0xba/0x150 [ 717.951858] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 717.956443] do_syscall_64+0xf9/0x620 [ 717.960290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.965469] RIP: 0033:0x7f996348801a [ 717.969170] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.988063] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 717.995761] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 718.003023] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 718.010284] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 718.017596] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 718.024863] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 38) [ 718.109091] BTRFS error (device loop2): superblock checksum mismatch [ 718.123072] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11361) [ 718.147194] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11363) 08:31:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000480800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 718.231926] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11374) [ 718.267508] FAULT_INJECTION: forcing a failure. [ 718.267508] name failslab, interval 1, probability 0, space 0, times 0 [ 718.272461] BTRFS error (device loop2): open_ctree failed [ 718.283499] CPU: 1 PID: 11383 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 718.292282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.301641] Call Trace: [ 718.304241] dump_stack+0x1fc/0x2ef [ 718.307886] should_fail.cold+0xa/0xf [ 718.311709] ? setup_fault_attr+0x200/0x200 [ 718.316042] ? lock_acquire+0x170/0x3c0 [ 718.320036] __should_failslab+0x115/0x180 [ 718.324291] should_failslab+0x5/0x10 [ 718.328095] kmem_cache_alloc+0x277/0x370 [ 718.332245] getname_flags+0xce/0x590 [ 718.336050] user_path_at_empty+0x2a/0x50 [ 718.340204] do_mount+0x147/0x2f50 [ 718.343742] ? cmp_ex_sort+0xc0/0xc0 [ 718.347451] ? __do_page_fault+0x180/0xd60 [ 718.351679] ? copy_mount_string+0x40/0x40 [ 718.355916] ? memset+0x20/0x40 [ 718.359189] ? copy_mount_options+0x26f/0x380 [ 718.363678] ksys_mount+0xcf/0x130 [ 718.367219] __x64_sys_mount+0xba/0x150 [ 718.371274] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 718.375851] do_syscall_64+0xf9/0x620 [ 718.379659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.384838] RIP: 0033:0x7f996348801a [ 718.388559] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.407459] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 718.415157] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 718.422418] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 08:31:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000007000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010006ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 718.429690] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 718.436959] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 718.444238] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 718.471123] BTRFS error (device loop2): superblock checksum mismatch 08:31:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000300010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 39) [ 718.564778] BTRFS error (device loop2): open_ctree failed [ 718.708047] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11397) [ 718.716259] FAULT_INJECTION: forcing a failure. [ 718.716259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.722638] BTRFS error (device loop2): superblock checksum mismatch [ 718.731575] CPU: 1 PID: 11415 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 718.731587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.731592] Call Trace: 08:31:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000004c0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 718.731614] dump_stack+0x1fc/0x2ef [ 718.731634] should_fail.cold+0xa/0xf [ 718.731653] ? setup_fault_attr+0x200/0x200 [ 718.731673] ? perf_trace_lock_acquire+0xef/0x530 [ 718.731688] ? deref_stack_reg+0x134/0x1d0 [ 718.731703] ? get_reg+0x176/0x1f0 [ 718.760806] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11411) [ 718.761600] __alloc_pages_nodemask+0x239/0x2890 [ 718.761618] ? HARDIRQ_verbose+0x10/0x10 [ 718.761636] ? cmp_ex_search+0x87/0xb0 [ 718.761656] ? __lock_acquire+0x6de/0x3ff0 [ 718.761679] ? copy_mount_options+0x1e9/0x380 [ 718.761695] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 718.761710] ? ex_handler_default+0x14/0x90 [ 718.761722] ? phys_mem_access_encrypted+0x10/0x10 [ 718.761743] ? perf_trace_lock_acquire+0xef/0x530 [ 718.761782] ? HARDIRQ_verbose+0x10/0x10 [ 718.761803] cache_grow_begin+0xa4/0x8a0 [ 718.780137] BTRFS error (device loop2): open_ctree failed [ 718.782483] ? setup_fault_attr+0x200/0x200 [ 718.782499] ? lock_acquire+0x170/0x3c0 [ 718.782519] cache_alloc_refill+0x273/0x340 [ 718.782541] kmem_cache_alloc+0x346/0x370 [ 718.782559] getname_flags+0xce/0x590 [ 718.868584] user_path_at_empty+0x2a/0x50 [ 718.872729] do_mount+0x147/0x2f50 [ 718.876283] ? cmp_ex_sort+0xc0/0xc0 [ 718.879989] ? __do_page_fault+0x180/0xd60 [ 718.884216] ? copy_mount_string+0x40/0x40 [ 718.888447] ? memset+0x20/0x40 [ 718.891719] ? copy_mount_options+0x26f/0x380 [ 718.896212] ksys_mount+0xcf/0x130 [ 718.899753] __x64_sys_mount+0xba/0x150 [ 718.903719] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 718.908294] do_syscall_64+0xf9/0x620 [ 718.912089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.917270] RIP: 0033:0x7f996348801a [ 718.920975] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.939864] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 718.947563] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 718.954822] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 718.962077] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 718.969333] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 718.976590] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000480300010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000008000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010007ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 719.041069] BTRFS error (device loop2): superblock checksum mismatch [ 719.125981] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11430) 08:31:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 40) [ 719.196517] BTRFS error (device loop2): open_ctree failed 08:31:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000680800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 719.293686] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11447) [ 719.307984] BTRFS error (device loop2): superblock checksum mismatch [ 719.320887] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11446) 08:31:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000900300010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010008ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 719.412285] BTRFS error (device loop2): open_ctree failed [ 719.499764] FAULT_INJECTION: forcing a failure. [ 719.499764] name failslab, interval 1, probability 0, space 0, times 0 [ 719.511531] CPU: 0 PID: 11463 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 719.519956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.529328] Call Trace: [ 719.531942] dump_stack+0x1fc/0x2ef [ 719.535605] should_fail.cold+0xa/0xf [ 719.539436] ? setup_fault_attr+0x200/0x200 [ 719.543815] ? lock_acquire+0x170/0x3c0 [ 719.547825] __should_failslab+0x115/0x180 [ 719.552088] should_failslab+0x5/0x10 [ 719.555908] __kmalloc_track_caller+0x2a6/0x3c0 [ 719.560599] ? btrfs_mount+0xb5/0xaa0 [ 719.564429] kstrdup+0x36/0x70 [ 719.567648] btrfs_mount+0xb5/0xaa0 [ 719.571305] ? btrfs_show_options+0xfd0/0xfd0 [ 719.575816] ? __mutex_unlock_slowpath+0xea/0x610 [ 719.580691] ? check_preemption_disabled+0x41/0x280 [ 719.585740] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 719.590887] ? pcpu_alloc+0xc9/0x1190 [ 719.594712] ? __lockdep_init_map+0x100/0x5a0 [ 719.599236] mount_fs+0xa3/0x310 [ 719.602637] vfs_kern_mount.part.0+0x68/0x470 [ 719.607161] do_mount+0x115c/0x2f50 [ 719.610815] ? cmp_ex_sort+0xc0/0xc0 [ 719.614545] ? __do_page_fault+0x180/0xd60 [ 719.618786] ? copy_mount_string+0x40/0x40 [ 719.623035] ? memset+0x20/0x40 [ 719.626314] ? copy_mount_options+0x26f/0x380 [ 719.630814] ksys_mount+0xcf/0x130 [ 719.634360] __x64_sys_mount+0xba/0x150 [ 719.638336] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 719.642915] do_syscall_64+0xf9/0x620 [ 719.646719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.651905] RIP: 0033:0x7f996348801a [ 719.655614] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 719.674507] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 719.682209] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 719.689476] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 719.696738] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 719.704003] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 719.711264] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000009000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 719.831792] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11470) [ 719.843797] BTRFS error (device loop2): superblock checksum mismatch 08:31:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 41) [ 719.897609] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11482) 08:31:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000006c0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 719.998648] BTRFS error (device loop2): open_ctree failed [ 720.012838] BTRFS error (device loop2): superblock checksum mismatch [ 720.013407] FAULT_INJECTION: forcing a failure. [ 720.013407] name failslab, interval 1, probability 0, space 0, times 0 [ 720.033618] CPU: 1 PID: 11496 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 720.041538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.050992] Call Trace: [ 720.053590] dump_stack+0x1fc/0x2ef [ 720.057239] should_fail.cold+0xa/0xf [ 720.061055] ? setup_fault_attr+0x200/0x200 [ 720.065445] ? lock_acquire+0x1ec/0x3c0 [ 720.069444] __should_failslab+0x115/0x180 [ 720.073700] should_failslab+0x5/0x10 [ 720.077516] __kmalloc_track_caller+0x2a6/0x3c0 [ 720.079298] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11492) [ 720.082198] ? kstrdup_const+0x53/0x80 [ 720.082217] kstrdup+0x36/0x70 [ 720.082233] kstrdup_const+0x53/0x80 [ 720.082248] alloc_vfsmnt+0xb5/0x780 [ 720.082263] ? _raw_read_unlock+0x29/0x40 [ 720.082280] vfs_kern_mount.part.0+0x27/0x470 [ 720.082301] do_mount+0x115c/0x2f50 [ 720.082320] ? cmp_ex_sort+0xc0/0xc0 [ 720.082339] ? __do_page_fault+0x180/0xd60 [ 720.082356] ? copy_mount_string+0x40/0x40 [ 720.082379] ? memset+0x20/0x40 [ 720.136237] ? copy_mount_options+0x26f/0x380 [ 720.140754] ksys_mount+0xcf/0x130 [ 720.144314] __x64_sys_mount+0xba/0x150 [ 720.148302] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 720.152895] do_syscall_64+0xf9/0x620 [ 720.156706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.161913] RIP: 0033:0x7f996348801a [ 720.165626] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.184519] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 720.192225] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 720.199494] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 720.206759] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 720.214028] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 720.221305] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000500010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 42) [ 720.371548] BTRFS error (device loop2): open_ctree failed 08:31:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 720.468346] FAULT_INJECTION: forcing a failure. [ 720.468346] name failslab, interval 1, probability 0, space 0, times 0 [ 720.486161] CPU: 0 PID: 11520 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 720.494079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.503560] Call Trace: [ 720.506176] dump_stack+0x1fc/0x2ef [ 720.509810] should_fail.cold+0xa/0xf [ 720.513633] ? setup_fault_attr+0x200/0x200 [ 720.517977] ? lock_acquire+0x170/0x3c0 [ 720.521980] __should_failslab+0x115/0x180 [ 720.526228] should_failslab+0x5/0x10 [ 720.530025] __kmalloc_track_caller+0x2a6/0x3c0 [ 720.534704] ? btrfs_mount+0xb5/0xaa0 [ 720.538691] kstrdup+0x36/0x70 [ 720.541972] btrfs_mount+0xb5/0xaa0 [ 720.545609] ? btrfs_show_options+0xfd0/0xfd0 [ 720.550110] ? __mutex_unlock_slowpath+0xea/0x610 [ 720.554962] ? check_preemption_disabled+0x41/0x280 [ 720.559985] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 720.565105] ? pcpu_alloc+0xc9/0x1190 [ 720.568984] ? __lockdep_init_map+0x100/0x5a0 [ 720.573593] mount_fs+0xa3/0x310 [ 720.576989] vfs_kern_mount.part.0+0x68/0x470 [ 720.581495] do_mount+0x115c/0x2f50 [ 720.585134] ? cmp_ex_sort+0xc0/0xc0 [ 720.588858] ? __do_page_fault+0x180/0xd60 [ 720.593111] ? copy_mount_string+0x40/0x40 [ 720.597366] ? memset+0x20/0x40 [ 720.600646] ? copy_mount_options+0x26f/0x380 [ 720.605147] ksys_mount+0xcf/0x130 [ 720.608684] __x64_sys_mount+0xba/0x150 [ 720.612658] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 720.617236] do_syscall_64+0xf9/0x620 [ 720.621034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.627242] RIP: 0033:0x7f996348801a [ 720.630964] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.649884] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 720.657600] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a 08:31:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00000a000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 720.664973] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 720.672247] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 720.679510] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 720.686778] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 720.712297] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11482) [ 720.751954] BTRFS error (device loop2): superblock checksum mismatch 08:31:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010009ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 720.797519] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11519) 08:31:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 43) 08:31:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000600010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 720.999575] BTRFS error (device loop2): open_ctree failed 08:31:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000740800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 721.079409] FAULT_INJECTION: forcing a failure. [ 721.079409] name failslab, interval 1, probability 0, space 0, times 0 [ 721.090977] CPU: 1 PID: 11551 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 721.098874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.108233] Call Trace: [ 721.110829] dump_stack+0x1fc/0x2ef [ 721.114473] should_fail.cold+0xa/0xf [ 721.118289] ? setup_fault_attr+0x200/0x200 [ 721.122625] ? lock_acquire+0x170/0x3c0 [ 721.126605] __should_failslab+0x115/0x180 [ 721.130857] should_failslab+0x5/0x10 [ 721.134666] __kmalloc_track_caller+0x2a6/0x3c0 [ 721.139354] ? btrfs_mount+0xb5/0xaa0 [ 721.143197] kstrdup+0x36/0x70 [ 721.146390] btrfs_mount+0xb5/0xaa0 [ 721.150023] ? btrfs_show_options+0xfd0/0xfd0 [ 721.154528] ? __mutex_unlock_slowpath+0xea/0x610 [ 721.159465] ? check_preemption_disabled+0x41/0x280 [ 721.164498] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 721.169515] ? pcpu_alloc+0xc9/0x1190 [ 721.173330] ? __lockdep_init_map+0x100/0x5a0 [ 721.177842] mount_fs+0xa3/0x310 [ 721.181252] vfs_kern_mount.part.0+0x68/0x470 [ 721.185776] do_mount+0x115c/0x2f50 [ 721.189406] ? cmp_ex_sort+0xc0/0xc0 [ 721.193152] ? __do_page_fault+0x180/0xd60 [ 721.197415] ? copy_mount_string+0x40/0x40 [ 721.201659] ? memset+0x20/0x40 [ 721.204934] ? copy_mount_options+0x26f/0x380 [ 721.209434] ksys_mount+0xcf/0x130 [ 721.212992] __x64_sys_mount+0xba/0x150 [ 721.216984] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 721.221613] do_syscall_64+0xf9/0x620 [ 721.225468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.230650] RIP: 0033:0x7f996348801a [ 721.234380] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 721.253471] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 721.261203] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 721.268476] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 721.275749] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 721.283031] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 721.290321] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000010000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 721.376561] BTRFS error (device loop2): superblock checksum mismatch [ 721.376657] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11553) 08:31:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 44) [ 721.463418] BTRFS error (device loop2): open_ctree failed [ 721.476794] BTRFS error (device loop2): superblock checksum mismatch [ 721.501942] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11569) 08:31:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010010ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000700010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c0000000000007a0800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 721.562340] BTRFS error (device loop2): open_ctree failed [ 721.603822] FAULT_INJECTION: forcing a failure. [ 721.603822] name failslab, interval 1, probability 0, space 0, times 0 [ 721.626112] CPU: 0 PID: 11580 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 721.634032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.643422] Call Trace: [ 721.646029] dump_stack+0x1fc/0x2ef [ 721.649691] should_fail.cold+0xa/0xf [ 721.653525] ? setup_fault_attr+0x200/0x200 [ 721.657877] ? lock_acquire+0x170/0x3c0 [ 721.661889] __should_failslab+0x115/0x180 [ 721.666133] should_failslab+0x5/0x10 [ 721.669940] __kmalloc_track_caller+0x2a6/0x3c0 [ 721.674617] ? kstrdup_const+0x53/0x80 [ 721.678501] kstrdup+0x36/0x70 [ 721.681703] kstrdup_const+0x53/0x80 [ 721.685437] alloc_vfsmnt+0xb5/0x780 [ 721.689170] vfs_kern_mount.part.0+0x27/0x470 [ 721.693678] ? kfree+0x110/0x210 [ 721.697060] vfs_kern_mount+0x3c/0x60 [ 721.700864] btrfs_mount+0x23a/0xaa0 [ 721.704584] ? btrfs_show_options+0xfd0/0xfd0 [ 721.709092] ? __mutex_unlock_slowpath+0xea/0x610 [ 721.713943] ? check_preemption_disabled+0x41/0x280 [ 721.718957] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 721.723967] ? pcpu_alloc+0xc9/0x1190 [ 721.727767] ? __lockdep_init_map+0x100/0x5a0 [ 721.732397] mount_fs+0xa3/0x310 [ 721.735783] vfs_kern_mount.part.0+0x68/0x470 [ 721.740279] do_mount+0x115c/0x2f50 [ 721.743904] ? cmp_ex_sort+0xc0/0xc0 [ 721.747718] ? __do_page_fault+0x180/0xd60 [ 721.751986] ? copy_mount_string+0x40/0x40 [ 721.756241] ? memset+0x20/0x40 [ 721.759521] ? copy_mount_options+0x26f/0x380 [ 721.764015] ksys_mount+0xcf/0x130 [ 721.767563] __x64_sys_mount+0xba/0x150 [ 721.771552] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 721.776139] do_syscall_64+0xf9/0x620 [ 721.779942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.785145] RIP: 0033:0x7f996348801a [ 721.788862] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 721.807771] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 721.815486] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 721.822746] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 721.830063] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 721.837348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 721.844629] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 45) [ 721.934315] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11592) [ 721.946586] BTRFS error (device loop2): superblock checksum mismatch [ 722.002877] BTRFS warning (device ): duplicate device /dev/loop1 devid 0 generation 0 scanned by syz-executor.1 (11593) 08:31:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000900010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 722.064251] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11600) 08:31:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000500000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 722.135568] FAULT_INJECTION: forcing a failure. [ 722.135568] name failslab, interval 1, probability 0, space 0, times 0 [ 722.152786] CPU: 1 PID: 11616 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 722.160693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.170173] Call Trace: [ 722.172773] dump_stack+0x1fc/0x2ef [ 722.176416] should_fail.cold+0xa/0xf [ 722.180214] ? setup_fault_attr+0x200/0x200 [ 722.184536] ? lock_acquire+0x170/0x3c0 [ 722.188528] __should_failslab+0x115/0x180 [ 722.192781] should_failslab+0x5/0x10 [ 722.196586] kmem_cache_alloc+0x277/0x370 [ 722.200726] alloc_vfsmnt+0x23/0x780 [ 722.204443] vfs_kern_mount.part.0+0x27/0x470 [ 722.208948] ? kfree+0x110/0x210 [ 722.212318] vfs_kern_mount+0x3c/0x60 [ 722.216130] btrfs_mount+0x23a/0xaa0 [ 722.219857] ? btrfs_show_options+0xfd0/0xfd0 [ 722.224367] ? __mutex_unlock_slowpath+0xea/0x610 [ 722.229210] ? check_preemption_disabled+0x41/0x280 08:31:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010023ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 722.234229] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 722.239265] ? pcpu_alloc+0xc9/0x1190 [ 722.243086] ? __lockdep_init_map+0x100/0x5a0 [ 722.247598] mount_fs+0xa3/0x310 [ 722.250981] vfs_kern_mount.part.0+0x68/0x470 [ 722.255504] do_mount+0x115c/0x2f50 [ 722.259145] ? cmp_ex_sort+0xc0/0xc0 [ 722.262879] ? __do_page_fault+0x180/0xd60 [ 722.267124] ? copy_mount_string+0x40/0x40 [ 722.271371] ? memset+0x20/0x40 [ 722.274654] ? copy_mount_options+0x26f/0x380 [ 722.279163] ksys_mount+0xcf/0x130 [ 722.282711] __x64_sys_mount+0xba/0x150 [ 722.286688] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 722.291271] do_syscall_64+0xf9/0x620 [ 722.295093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.300307] RIP: 0033:0x7f996348801a [ 722.304018] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.322928] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 722.330655] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 722.337915] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 722.345185] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 722.352465] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 722.359823] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 46) [ 722.506992] BTRFS error (device loop2): open_ctree failed [ 722.542441] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11618) 08:31:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000900000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000023000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 722.581869] BTRFS error (device loop2): superblock checksum mismatch [ 722.597419] BTRFS error (device loop2): open_ctree failed 08:31:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000001f00010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 722.624976] BTRFS error (device loop2): superblock checksum mismatch [ 722.668461] FAULT_INJECTION: forcing a failure. [ 722.668461] name failslab, interval 1, probability 0, space 0, times 0 [ 722.685990] CPU: 1 PID: 11646 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 722.693898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.703258] Call Trace: [ 722.705864] dump_stack+0x1fc/0x2ef [ 722.709514] should_fail.cold+0xa/0xf [ 722.713326] ? setup_fault_attr+0x200/0x200 [ 722.717657] ? lock_acquire+0x170/0x3c0 [ 722.721648] __should_failslab+0x115/0x180 [ 722.725978] should_failslab+0x5/0x10 [ 722.729787] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 722.734896] __kmalloc_node+0x38/0x70 [ 722.738691] kvmalloc_node+0xb4/0xf0 [ 722.742621] btrfs_mount_root+0x13f/0x1830 [ 722.746862] ? btrfs_decode_error+0x70/0x70 [ 722.751198] ? __mutex_unlock_slowpath+0xea/0x610 [ 722.756062] ? check_preemption_disabled+0x41/0x280 [ 722.761081] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 722.766100] ? pcpu_alloc+0xc9/0x1190 [ 722.769895] ? __lockdep_init_map+0x100/0x5a0 [ 722.774382] mount_fs+0xa3/0x310 [ 722.777742] vfs_kern_mount.part.0+0x68/0x470 [ 722.782225] ? kfree+0x110/0x210 [ 722.785581] vfs_kern_mount+0x3c/0x60 [ 722.789374] btrfs_mount+0x23a/0xaa0 [ 722.793078] ? btrfs_show_options+0xfd0/0xfd0 [ 722.797908] ? __mutex_unlock_slowpath+0xea/0x610 [ 722.802742] ? check_preemption_disabled+0x41/0x280 [ 722.807754] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 722.812760] ? pcpu_alloc+0xc9/0x1190 [ 722.816553] ? __lockdep_init_map+0x100/0x5a0 [ 722.821046] mount_fs+0xa3/0x310 [ 722.824410] vfs_kern_mount.part.0+0x68/0x470 [ 722.828904] do_mount+0x115c/0x2f50 [ 722.832569] ? cmp_ex_sort+0xc0/0xc0 [ 722.836275] ? __do_page_fault+0x180/0xd60 [ 722.840505] ? copy_mount_string+0x40/0x40 [ 722.844735] ? memset+0x20/0x40 [ 722.848002] ? copy_mount_options+0x26f/0x380 [ 722.852494] ksys_mount+0xcf/0x130 [ 722.856024] __x64_sys_mount+0xba/0x150 [ 722.860017] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 722.864585] do_syscall_64+0xf9/0x620 [ 722.868380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.873656] RIP: 0033:0x7f996348801a [ 722.877359] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.896245] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 722.903940] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 722.911213] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 722.918475] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 722.925906] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 722.933160] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010048ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 722.983641] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11653) [ 723.010257] BTRFS error (device loop2): open_ctree failed 08:31:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000a00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 723.073562] BTRFS error (device loop2): superblock checksum mismatch [ 723.102819] BTRFS error (device loop2): open_ctree failed 08:31:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000002000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 47) [ 723.402083] BTRFS error (device loop2): superblock checksum mismatch [ 723.456985] BTRFS error (device loop2): open_ctree failed [ 723.496644] BTRFS error (device loop2): superblock checksum mismatch [ 723.508298] BTRFS error (device loop2): open_ctree failed [ 723.520311] FAULT_INJECTION: forcing a failure. [ 723.520311] name failslab, interval 1, probability 0, space 0, times 0 [ 723.543906] BTRFS error (device loop2): superblock checksum mismatch [ 723.552511] BTRFS error (device loop2): open_ctree failed 08:31:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 723.567239] CPU: 1 PID: 11700 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 723.575142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.584510] Call Trace: [ 723.587109] dump_stack+0x1fc/0x2ef [ 723.590762] should_fail.cold+0xa/0xf [ 723.594575] ? setup_fault_attr+0x200/0x200 [ 723.598904] ? lock_acquire+0x170/0x3c0 [ 723.602893] __should_failslab+0x115/0x180 [ 723.607135] should_failslab+0x5/0x10 [ 723.610940] kmem_cache_alloc_trace+0x284/0x380 [ 723.615617] btrfs_mount_root+0x188/0x1830 [ 723.619889] ? btrfs_decode_error+0x70/0x70 [ 723.624208] ? __mutex_unlock_slowpath+0xea/0x610 [ 723.629044] ? check_preemption_disabled+0x41/0x280 [ 723.634053] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 723.639058] ? pcpu_alloc+0xc9/0x1190 [ 723.642848] ? __lockdep_init_map+0x100/0x5a0 [ 723.647342] mount_fs+0xa3/0x310 [ 723.650701] vfs_kern_mount.part.0+0x68/0x470 [ 723.655192] ? kfree+0x110/0x210 [ 723.658550] vfs_kern_mount+0x3c/0x60 [ 723.662352] btrfs_mount+0x23a/0xaa0 [ 723.666057] ? btrfs_show_options+0xfd0/0xfd0 [ 723.670541] ? __mutex_unlock_slowpath+0xea/0x610 [ 723.675381] ? check_preemption_disabled+0x41/0x280 [ 723.680393] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 723.685413] ? pcpu_alloc+0xc9/0x1190 [ 723.689206] ? __lockdep_init_map+0x100/0x5a0 [ 723.693710] mount_fs+0xa3/0x310 [ 723.697068] vfs_kern_mount.part.0+0x68/0x470 [ 723.701555] do_mount+0x115c/0x2f50 [ 723.705176] ? cmp_ex_sort+0xc0/0xc0 [ 723.708879] ? __do_page_fault+0x180/0xd60 [ 723.713102] ? copy_mount_string+0x40/0x40 [ 723.717332] ? memset+0x20/0x40 [ 723.720613] ? copy_mount_options+0x26f/0x380 [ 723.725110] ksys_mount+0xcf/0x130 [ 723.728642] __x64_sys_mount+0xba/0x150 [ 723.732606] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 723.737176] do_syscall_64+0xf9/0x620 [ 723.740974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.746152] RIP: 0033:0x7f996348801a [ 723.749874] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 723.768758] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 723.776463] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 723.783724] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 723.790980] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 723.798249] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 723.805503] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 723.816665] BTRFS error (device loop2): superblock checksum mismatch [ 723.830781] BTRFS error (device loop2): open_ctree failed 08:31:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000001004cffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000b00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 723.890544] BTRFS error (device loop2): superblock checksum mismatch [ 723.907767] BTRFS error (device loop2): open_ctree failed 08:31:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00002b000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010068ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 48) 08:31:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000002300010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000c00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000048000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 724.224953] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11757) [ 724.247897] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11758) [ 724.260566] BTRFS error (device loop2): superblock checksum mismatch 08:31:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000003f00010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 724.322009] FAULT_INJECTION: forcing a failure. [ 724.322009] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 724.336953] CPU: 1 PID: 11759 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 724.344856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.354249] Call Trace: [ 724.356849] dump_stack+0x1fc/0x2ef [ 724.360498] should_fail.cold+0xa/0xf [ 724.364308] ? lock_acquire+0x170/0x3c0 [ 724.368291] ? setup_fault_attr+0x200/0x200 [ 724.372633] __alloc_pages_nodemask+0x239/0x2890 [ 724.377407] ? HARDIRQ_verbose+0x10/0x10 [ 724.381478] ? __radix_tree_lookup+0x216/0x370 [ 724.386075] ? find_get_entry+0x4cd/0x8a0 [ 724.390340] ? lock_downgrade+0x720/0x720 [ 724.394515] ? __radix_tree_lookup+0x370/0x370 [ 724.399107] ? check_preemption_disabled+0x41/0x280 [ 724.404142] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 724.408998] ? iput+0xc9/0x860 [ 724.412311] ? find_get_pages_range_tag+0xc50/0xc50 [ 724.417449] ? blkdev_get+0xd0/0x940 [ 724.421187] alloc_pages_current+0x193/0x2a0 [ 724.425607] do_read_cache_page+0xa36/0x1170 [ 724.430025] ? blkdev_writepages+0x20/0x20 [ 724.434273] btrfs_scan_one_device+0x195/0xd00 [ 724.438865] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 724.443978] ? debug_check_no_obj_freed+0x201/0x490 [ 724.448996] ? device_list_add+0xdd0/0xdd0 [ 724.453321] ? kfree+0x110/0x210 [ 724.456684] ? btrfs_mount_root+0x107a/0x1830 [ 724.461182] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 724.465775] btrfs_mount_root+0x9df/0x1830 [ 724.470024] ? btrfs_decode_error+0x70/0x70 [ 724.474353] ? __mutex_unlock_slowpath+0xea/0x610 [ 724.479207] ? check_preemption_disabled+0x41/0x280 [ 724.484240] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 724.489261] ? pcpu_alloc+0xc9/0x1190 [ 724.493071] ? __lockdep_init_map+0x100/0x5a0 [ 724.497583] mount_fs+0xa3/0x310 [ 724.500964] vfs_kern_mount.part.0+0x68/0x470 [ 724.505462] ? kfree+0x110/0x210 [ 724.508847] vfs_kern_mount+0x3c/0x60 [ 724.512659] btrfs_mount+0x23a/0xaa0 [ 724.516418] ? btrfs_show_options+0xfd0/0xfd0 [ 724.520919] ? __mutex_unlock_slowpath+0xea/0x610 [ 724.525776] ? check_preemption_disabled+0x41/0x280 [ 724.530808] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 724.535836] ? pcpu_alloc+0xc9/0x1190 [ 724.539645] ? __lockdep_init_map+0x100/0x5a0 [ 724.544153] mount_fs+0xa3/0x310 [ 724.547535] vfs_kern_mount.part.0+0x68/0x470 [ 724.552040] do_mount+0x115c/0x2f50 [ 724.555673] ? cmp_ex_sort+0xc0/0xc0 [ 724.559425] ? __do_page_fault+0x180/0xd60 [ 724.563758] ? copy_mount_string+0x40/0x40 [ 724.568005] ? memset+0x20/0x40 [ 724.571292] ? copy_mount_options+0x26f/0x380 [ 724.575795] ksys_mount+0xcf/0x130 [ 724.579346] __x64_sys_mount+0xba/0x150 [ 724.583336] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 724.587924] do_syscall_64+0xf9/0x620 [ 724.591740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.596931] RIP: 0033:0x7f996348801a [ 724.600649] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 724.619550] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 724.627261] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 724.634536] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 724.641814] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 724.649095] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 724.656371] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000d00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 49) [ 724.786327] BTRFS error (device loop2): open_ctree failed [ 724.792344] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11774) [ 724.822050] BTRFS error (device loop2): superblock checksum mismatch 08:31:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000001006cffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 724.858536] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11782) 08:31:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00004c000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000034800010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 724.942571] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11789) [ 725.050420] BTRFS error (device loop2): open_ctree failed [ 725.069943] FAULT_INJECTION: forcing a failure. [ 725.069943] name failslab, interval 1, probability 0, space 0, times 0 [ 725.092774] CPU: 0 PID: 11797 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 725.100669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.110013] Call Trace: [ 725.112615] dump_stack+0x1fc/0x2ef [ 725.116427] should_fail.cold+0xa/0xf [ 725.120229] ? setup_fault_attr+0x200/0x200 [ 725.124548] ? lock_acquire+0x170/0x3c0 [ 725.128522] __should_failslab+0x115/0x180 [ 725.132764] should_failslab+0x5/0x10 [ 725.136560] kmem_cache_alloc+0x277/0x370 [ 725.140711] getname_kernel+0x4e/0x370 [ 725.144610] kern_path+0x1b/0x40 [ 725.147966] lookup_bdev+0xfc/0x220 [ 725.151680] ? bd_acquire+0x440/0x440 [ 725.155615] ? try_release_extent_buffer+0x3a0/0x3a0 [ 725.160854] ? list_sort.part.0+0x523/0x790 [ 725.165197] ? try_release_extent_buffer+0x3a0/0x3a0 [ 725.170313] blkdev_get_by_path+0x1b/0xd0 [ 725.174464] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 725.178970] open_fs_devices+0x5a3/0xa50 [ 725.183243] ? find_fsid+0xb0/0xb0 [ 725.186789] ? debug_check_no_obj_freed+0x201/0x490 [ 725.191828] btrfs_open_devices+0x114/0x150 [ 725.196159] btrfs_mount_root+0xa60/0x1830 [ 725.200459] ? btrfs_decode_error+0x70/0x70 [ 725.204784] ? __mutex_unlock_slowpath+0xea/0x610 [ 725.209623] ? check_preemption_disabled+0x41/0x280 [ 725.214655] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 725.219680] ? pcpu_alloc+0xc9/0x1190 [ 725.223490] ? __lockdep_init_map+0x100/0x5a0 [ 725.227989] mount_fs+0xa3/0x310 [ 725.231379] vfs_kern_mount.part.0+0x68/0x470 [ 725.235885] ? kfree+0x110/0x210 [ 725.239253] vfs_kern_mount+0x3c/0x60 [ 725.243071] btrfs_mount+0x23a/0xaa0 [ 725.246786] ? btrfs_show_options+0xfd0/0xfd0 [ 725.251285] ? __mutex_unlock_slowpath+0xea/0x610 [ 725.256128] ? check_preemption_disabled+0x41/0x280 [ 725.261168] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 725.266191] ? pcpu_alloc+0xc9/0x1190 [ 725.270018] ? __lockdep_init_map+0x100/0x5a0 [ 725.274533] mount_fs+0xa3/0x310 [ 725.277987] vfs_kern_mount.part.0+0x68/0x470 [ 725.282478] do_mount+0x115c/0x2f50 [ 725.286120] ? cmp_ex_sort+0xc0/0xc0 [ 725.289836] ? __do_page_fault+0x180/0xd60 [ 725.294089] ? copy_mount_string+0x40/0x40 [ 725.298593] ? memset+0x20/0x40 [ 725.301875] ? copy_mount_options+0x26f/0x380 [ 725.306440] ksys_mount+0xcf/0x130 [ 725.309987] __x64_sys_mount+0xba/0x150 [ 725.313956] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 725.318542] do_syscall_64+0xf9/0x620 [ 725.322359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.327556] RIP: 0033:0x7f996348801a [ 725.331287] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.350192] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 725.357894] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 725.365171] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 725.372429] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 725.379697] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 725.386975] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07003f00000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 50) 08:31:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000060000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000e00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 725.571686] FAULT_INJECTION: forcing a failure. [ 725.571686] name failslab, interval 1, probability 0, space 0, times 0 [ 725.587178] CPU: 0 PID: 11831 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 725.595084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.604442] Call Trace: [ 725.607048] dump_stack+0x1fc/0x2ef [ 725.610683] should_fail.cold+0xa/0xf [ 725.614487] ? setup_fault_attr+0x200/0x200 [ 725.618814] ? lock_acquire+0x170/0x3c0 [ 725.622797] __should_failslab+0x115/0x180 [ 725.627028] should_failslab+0x5/0x10 [ 725.630822] kmem_cache_alloc+0x277/0x370 [ 725.634967] getname_kernel+0x4e/0x370 [ 725.638845] kern_path+0x1b/0x40 [ 725.642201] lookup_bdev+0xfc/0x220 [ 725.645814] ? bd_acquire+0x440/0x440 [ 725.649600] ? debug_check_no_obj_freed+0x201/0x490 [ 725.654719] blkdev_get_by_path+0x1b/0xd0 [ 725.658870] btrfs_scan_one_device+0xd0/0xd00 [ 725.663358] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 725.668453] ? debug_check_no_obj_freed+0x201/0x490 [ 725.673460] ? device_list_add+0xdd0/0xdd0 [ 725.677683] ? kfree+0x110/0x210 [ 725.681039] ? btrfs_mount_root+0x107a/0x1830 [ 725.685525] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 725.690109] btrfs_mount_root+0x9df/0x1830 [ 725.694357] ? btrfs_decode_error+0x70/0x70 [ 725.698671] ? __mutex_unlock_slowpath+0xea/0x610 [ 725.703513] ? check_preemption_disabled+0x41/0x280 [ 725.708582] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 725.713605] ? pcpu_alloc+0xc9/0x1190 [ 725.717416] ? __lockdep_init_map+0x100/0x5a0 [ 725.721906] mount_fs+0xa3/0x310 [ 725.725267] vfs_kern_mount.part.0+0x68/0x470 [ 725.729796] ? kfree+0x110/0x210 [ 725.733152] vfs_kern_mount+0x3c/0x60 [ 725.736987] btrfs_mount+0x23a/0xaa0 [ 725.740718] ? btrfs_show_options+0xfd0/0xfd0 [ 725.745207] ? __mutex_unlock_slowpath+0xea/0x610 [ 725.750065] ? check_preemption_disabled+0x41/0x280 [ 725.755091] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 725.760096] ? pcpu_alloc+0xc9/0x1190 [ 725.763887] ? __lockdep_init_map+0x100/0x5a0 [ 725.768375] mount_fs+0xa3/0x310 [ 725.771737] vfs_kern_mount.part.0+0x68/0x470 [ 725.776225] do_mount+0x115c/0x2f50 [ 725.779860] ? cmp_ex_sort+0xc0/0xc0 [ 725.783576] ? __do_page_fault+0x180/0xd60 [ 725.787802] ? copy_mount_string+0x40/0x40 [ 725.792053] ? memset+0x20/0x40 [ 725.795871] ? copy_mount_options+0x26f/0x380 [ 725.800382] ksys_mount+0xcf/0x130 [ 725.803940] __x64_sys_mount+0xba/0x150 [ 725.807923] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 725.812510] do_syscall_64+0xf9/0x620 [ 725.816322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.821510] RIP: 0033:0x7f996348801a [ 725.825225] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.844119] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 725.851819] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 725.859079] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 725.866382] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 725.873645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 725.880905] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000006000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010074ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 51) [ 725.978564] BTRFS error (device loop2): superblock checksum mismatch [ 726.040459] BTRFS error (device loop2): open_ctree failed [ 726.048498] BTRFS error (device loop2): superblock checksum mismatch [ 726.076739] BTRFS error (device loop2): open_ctree failed [ 726.092534] BTRFS error (device loop2): superblock checksum mismatch [ 726.096038] FAULT_INJECTION: forcing a failure. [ 726.096038] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 726.110841] CPU: 0 PID: 11863 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 726.118718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.128062] Call Trace: [ 726.130651] dump_stack+0x1fc/0x2ef [ 726.134279] should_fail.cold+0xa/0xf [ 726.138078] ? setup_fault_attr+0x200/0x200 [ 726.142410] __alloc_pages_nodemask+0x239/0x2890 [ 726.147197] ? mark_held_locks+0xf0/0xf0 [ 726.151265] ? __lock_acquire+0x6de/0x3ff0 [ 726.155507] ? perf_trace_run_bpf_submit+0x144/0x220 [ 726.160609] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 726.165455] ? perf_trace_run_bpf_submit+0x144/0x220 [ 726.170563] ? perf_trace_lock_acquire+0x36b/0x530 [ 726.175521] ? HARDIRQ_verbose+0x10/0x10 [ 726.179590] cache_grow_begin+0xa4/0x8a0 [ 726.183735] ? setup_fault_attr+0x200/0x200 [ 726.188049] ? lock_acquire+0x170/0x3c0 [ 726.192108] cache_alloc_refill+0x273/0x340 [ 726.196444] kmem_cache_alloc+0x346/0x370 [ 726.200591] getname_kernel+0x4e/0x370 [ 726.204478] kern_path+0x1b/0x40 [ 726.207839] lookup_bdev+0xfc/0x220 [ 726.211459] ? bd_acquire+0x440/0x440 [ 726.215254] ? debug_check_no_obj_freed+0x201/0x490 [ 726.220276] blkdev_get_by_path+0x1b/0xd0 [ 726.224426] btrfs_scan_one_device+0xd0/0xd00 [ 726.228925] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 726.234018] ? debug_check_no_obj_freed+0x201/0x490 [ 726.239060] ? device_list_add+0xdd0/0xdd0 [ 726.243311] ? kfree+0x110/0x210 [ 726.246680] ? btrfs_mount_root+0x107a/0x1830 [ 726.251349] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 726.255939] btrfs_mount_root+0x9df/0x1830 [ 726.260188] ? btrfs_decode_error+0x70/0x70 [ 726.264507] ? __mutex_unlock_slowpath+0xea/0x610 [ 726.269356] ? check_preemption_disabled+0x41/0x280 [ 726.274380] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 726.279403] ? pcpu_alloc+0xc9/0x1190 [ 726.283205] ? __lockdep_init_map+0x100/0x5a0 [ 726.287703] mount_fs+0xa3/0x310 [ 726.291077] vfs_kern_mount.part.0+0x68/0x470 [ 726.295566] ? kfree+0x110/0x210 [ 726.298930] vfs_kern_mount+0x3c/0x60 [ 726.302743] btrfs_mount+0x23a/0xaa0 [ 726.306460] ? btrfs_show_options+0xfd0/0xfd0 [ 726.310947] ? __mutex_unlock_slowpath+0xea/0x610 [ 726.315796] ? check_preemption_disabled+0x41/0x280 [ 726.320832] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 726.325843] ? pcpu_alloc+0xc9/0x1190 [ 726.329652] ? __lockdep_init_map+0x100/0x5a0 [ 726.334150] mount_fs+0xa3/0x310 [ 726.337522] vfs_kern_mount.part.0+0x68/0x470 [ 726.342018] do_mount+0x115c/0x2f50 [ 726.345650] ? cmp_ex_sort+0xc0/0xc0 [ 726.349366] ? __do_page_fault+0x180/0xd60 [ 726.353616] ? copy_mount_string+0x40/0x40 [ 726.357871] ? memset+0x20/0x40 [ 726.361148] ? copy_mount_options+0x26f/0x380 [ 726.365905] ksys_mount+0xcf/0x130 [ 726.369451] __x64_sys_mount+0xba/0x150 [ 726.373424] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 726.378002] do_syscall_64+0xf9/0x620 [ 726.381813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.387004] RIP: 0033:0x7f996348801a [ 726.390717] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.409608] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 726.417310] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 726.424570] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 726.431971] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 08:31:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 726.439237] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 726.446501] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000068000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 726.544500] BTRFS error (device loop2): open_ctree failed [ 726.553536] BTRFS error (device loop2): superblock checksum mismatch [ 726.568724] BTRFS error (device loop2): open_ctree failed [ 726.583982] BTRFS error (device loop2): superblock checksum mismatch 08:31:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 52) 08:31:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000007000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 726.689378] BTRFS error (device loop2): open_ctree failed [ 726.747566] BTRFS error (device loop2): superblock checksum mismatch [ 726.756116] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11904) [ 726.775917] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (11917) 08:31:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001100000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 726.862881] FAULT_INJECTION: forcing a failure. [ 726.862881] name failslab, interval 1, probability 0, space 0, times 0 [ 726.881211] CPU: 0 PID: 11920 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 726.889124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.898478] Call Trace: [ 726.901099] dump_stack+0x1fc/0x2ef [ 726.904722] should_fail.cold+0xa/0xf [ 726.908512] ? setup_fault_attr+0x200/0x200 [ 726.912819] ? lock_acquire+0x170/0x3c0 [ 726.916791] __should_failslab+0x115/0x180 [ 726.921018] should_failslab+0x5/0x10 [ 726.924804] kmem_cache_alloc+0x277/0x370 [ 726.928948] getname_kernel+0x4e/0x370 [ 726.932824] kern_path+0x1b/0x40 [ 726.936177] lookup_bdev+0xfc/0x220 [ 726.939920] ? bd_acquire+0x440/0x440 [ 726.943712] ? try_release_extent_buffer+0x3a0/0x3a0 [ 726.948829] ? list_sort.part.0+0x523/0x790 [ 726.953146] ? try_release_extent_buffer+0x3a0/0x3a0 [ 726.958253] blkdev_get_by_path+0x1b/0xd0 [ 726.962391] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 726.966874] open_fs_devices+0x5a3/0xa50 [ 726.970948] ? find_fsid+0xb0/0xb0 [ 726.974484] ? debug_check_no_obj_freed+0x201/0x490 [ 726.979509] btrfs_open_devices+0x114/0x150 [ 726.983847] btrfs_mount_root+0xa60/0x1830 [ 726.988090] ? btrfs_decode_error+0x70/0x70 [ 726.992424] ? __mutex_unlock_slowpath+0xea/0x610 [ 726.997785] ? check_preemption_disabled+0x41/0x280 [ 727.002796] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 727.007798] ? pcpu_alloc+0xc9/0x1190 [ 727.011587] ? __lockdep_init_map+0x100/0x5a0 [ 727.016075] mount_fs+0xa3/0x310 [ 727.019454] vfs_kern_mount.part.0+0x68/0x470 [ 727.023949] ? kfree+0x110/0x210 [ 727.027409] vfs_kern_mount+0x3c/0x60 [ 727.031392] btrfs_mount+0x23a/0xaa0 [ 727.035096] ? btrfs_show_options+0xfd0/0xfd0 [ 727.039587] ? __mutex_unlock_slowpath+0xea/0x610 [ 727.044444] ? check_preemption_disabled+0x41/0x280 [ 727.049470] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 727.054476] ? pcpu_alloc+0xc9/0x1190 [ 727.058279] ? __lockdep_init_map+0x100/0x5a0 [ 727.062765] mount_fs+0xa3/0x310 [ 727.066123] vfs_kern_mount.part.0+0x68/0x470 [ 727.070609] do_mount+0x115c/0x2f50 [ 727.074227] ? cmp_ex_sort+0xc0/0xc0 [ 727.077945] ? __do_page_fault+0x180/0xd60 [ 727.082170] ? copy_mount_string+0x40/0x40 [ 727.086402] ? memset+0x20/0x40 [ 727.089669] ? copy_mount_options+0x26f/0x380 [ 727.094158] ksys_mount+0xcf/0x130 [ 727.098135] __x64_sys_mount+0xba/0x150 [ 727.102101] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 727.106671] do_syscall_64+0xf9/0x620 [ 727.110459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.115632] RIP: 0033:0x7f996348801a [ 727.119332] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.138220] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 727.145918] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 727.153187] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 727.160455] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 727.167721] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 727.174991] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 08:31:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000000001007affffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000039000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 727.251303] BTRFS error (device loop2): open_ctree failed [ 727.263947] BTRFS error (device loop2): superblock checksum mismatch 08:31:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 53) 08:31:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00006c000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 727.352723] BTRFS error (device loop2): open_ctree failed 08:31:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) 08:31:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001200000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) 08:31:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e8500000000f000010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 727.584323] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (11974) [ 727.597825] BTRFS error (device loop2): superblock checksum mismatch [ 727.606647] FAULT_INJECTION: forcing a failure. [ 727.606647] name failslab, interval 1, probability 0, space 0, times 0 [ 727.618483] CPU: 0 PID: 11979 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 727.626384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.635750] Call Trace: [ 727.638357] dump_stack+0x1fc/0x2ef [ 727.642011] should_fail.cold+0xa/0xf [ 727.645848] ? setup_fault_attr+0x200/0x200 [ 727.650189] ? __lock_acquire+0x6de/0x3ff0 [ 727.654455] __should_failslab+0x115/0x180 [ 727.658713] should_failslab+0x5/0x10 [ 727.662517] kmem_cache_alloc+0x3f/0x370 [ 727.666568] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 727.672183] __radix_tree_create+0x314/0x540 [ 727.676586] page_cache_tree_insert+0xac/0x3f0 [ 727.681159] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 727.686601] ? lock_acquire+0x170/0x3c0 [ 727.690562] ? __add_to_page_cache_locked+0x45e/0xb60 [ 727.695747] __add_to_page_cache_locked+0x46e/0xb60 [ 727.700752] ? page_cache_tree_insert+0x3f0/0x3f0 [ 727.705588] add_to_page_cache_lru+0x16a/0x680 [ 727.710156] ? add_to_page_cache_locked+0x40/0x40 [ 727.714991] pagecache_get_page+0x478/0xd50 [ 727.719306] __getblk_slow+0x216/0x9e0 [ 727.723188] __bread_gfp+0x218/0x300 [ 727.726893] btrfs_read_dev_super+0x8a/0x230 [ 727.731285] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 727.735766] open_fs_devices+0x5a3/0xa50 [ 727.739815] ? find_fsid+0xb0/0xb0 [ 727.743360] btrfs_open_devices+0x114/0x150 [ 727.747668] btrfs_mount_root+0xa60/0x1830 [ 727.751896] ? btrfs_decode_error+0x70/0x70 [ 727.756250] ? __mutex_unlock_slowpath+0xea/0x610 [ 727.761168] ? check_preemption_disabled+0x41/0x280 [ 727.766181] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 727.771210] ? pcpu_alloc+0xc9/0x1190 [ 727.774999] ? __lockdep_init_map+0x100/0x5a0 [ 727.779495] mount_fs+0xa3/0x310 [ 727.782855] vfs_kern_mount.part.0+0x68/0x470 [ 727.787334] ? kfree+0x110/0x210 [ 727.790687] vfs_kern_mount+0x3c/0x60 [ 727.794475] btrfs_mount+0x23a/0xaa0 [ 727.798173] ? btrfs_show_options+0xfd0/0xfd0 [ 727.802657] ? __mutex_unlock_slowpath+0xea/0x610 [ 727.807491] ? check_preemption_disabled+0x41/0x280 [ 727.812511] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 727.817511] ? pcpu_alloc+0xc9/0x1190 [ 727.821307] ? __lockdep_init_map+0x100/0x5a0 [ 727.825802] mount_fs+0xa3/0x310 [ 727.829160] vfs_kern_mount.part.0+0x68/0x470 [ 727.833645] do_mount+0x115c/0x2f50 [ 727.837261] ? cmp_ex_sort+0xc0/0xc0 [ 727.840965] ? __do_page_fault+0x180/0xd60 [ 727.845274] ? copy_mount_string+0x40/0x40 [ 727.849501] ? memset+0x20/0x40 [ 727.852766] ? copy_mount_options+0x26f/0x380 [ 727.857251] ksys_mount+0xcf/0x130 [ 727.860780] __x64_sys_mount+0xba/0x150 [ 727.864743] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 727.869316] do_syscall_64+0xf9/0x620 [ 727.873107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.878285] RIP: 0033:0x7f996348801a [ 727.881986] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.900892] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 727.908597] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 727.915853] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 727.923121] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 727.930374] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 727.937644] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 727.950695] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (11995) [ 727.968050] BTRFS error (device loop2): open_ctree failed [ 727.976347] BTRFS error (device loop2): superblock checksum mismatch 08:31:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 54) 08:31:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000074000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 728.003971] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (12006) 08:31:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000000000100000200ff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) 08:31:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e850000000fff00010000ffffff8c000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 728.174937] BTRFS error (device loop2): open_ctree failed 08:31:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000001f00000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 728.309921] BTRFS error (device loop2): superblock checksum mismatch [ 728.311360] FAULT_INJECTION: forcing a failure. [ 728.311360] name failslab, interval 1, probability 0, space 0, times 0 [ 728.347769] CPU: 1 PID: 12030 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 728.355680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.365039] Call Trace: [ 728.367642] dump_stack+0x1fc/0x2ef [ 728.371288] should_fail.cold+0xa/0xf [ 728.375100] ? vfs_kern_mount+0x3c/0x60 [ 728.379091] ? setup_fault_attr+0x200/0x200 [ 728.383422] ? blk_queue_enter+0x40b/0xb70 [ 728.387671] __should_failslab+0x115/0x180 [ 728.391925] should_failslab+0x5/0x10 [ 728.395997] kmem_cache_alloc_node+0x54/0x3b0 [ 728.400508] create_task_io_context+0x2c/0x430 [ 728.405105] generic_make_request_checks+0x1c4f/0x22e0 [ 728.410420] ? should_fail_bio.isra.0+0xa0/0xa0 [ 728.415104] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 728.420133] ? kmem_cache_alloc+0x315/0x370 [ 728.424480] generic_make_request+0x23f/0xdf0 [ 728.429014] ? blk_put_request+0x110/0x110 [ 728.433267] ? HARDIRQ_verbose+0x10/0x10 [ 728.437352] ? alloc_buffer_head+0x20/0x130 [ 728.441697] submit_bio+0xb1/0x430 [ 728.445254] ? generic_make_request+0xdf0/0xdf0 [ 728.449937] ? check_preemption_disabled+0x41/0x280 [ 728.454974] ? guard_bio_eod+0x2a0/0x650 [ 728.459048] submit_bh_wbc+0x5a7/0x760 [ 728.462956] block_read_full_page+0x7cf/0xd10 [ 728.467462] ? block_llseek+0xc0/0xc0 [ 728.471278] ? __bread_gfp+0x300/0x300 [ 728.475182] ? add_to_page_cache_locked+0x40/0x40 [ 728.480048] do_read_cache_page+0x533/0x1170 [ 728.484467] ? blkdev_writepages+0x20/0x20 [ 728.488718] btrfs_scan_one_device+0x195/0xd00 [ 728.493314] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 728.498425] ? debug_check_no_obj_freed+0x201/0x490 [ 728.503453] ? device_list_add+0xdd0/0xdd0 [ 728.507698] ? kfree+0x110/0x210 [ 728.511111] ? btrfs_mount_root+0x107a/0x1830 [ 728.515617] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 728.520224] btrfs_mount_root+0x9df/0x1830 [ 728.524479] ? btrfs_decode_error+0x70/0x70 [ 728.528906] ? __mutex_unlock_slowpath+0xea/0x610 [ 728.533763] ? check_preemption_disabled+0x41/0x280 [ 728.538799] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 728.543827] ? pcpu_alloc+0xc9/0x1190 [ 728.547646] ? __lockdep_init_map+0x100/0x5a0 [ 728.552155] mount_fs+0xa3/0x310 [ 728.555539] vfs_kern_mount.part.0+0x68/0x470 [ 728.560043] ? kfree+0x110/0x210 [ 728.563424] vfs_kern_mount+0x3c/0x60 [ 728.567247] btrfs_mount+0x23a/0xaa0 [ 728.571064] ? btrfs_show_options+0xfd0/0xfd0 [ 728.575585] ? __mutex_unlock_slowpath+0xea/0x610 [ 728.580444] ? check_preemption_disabled+0x41/0x280 [ 728.585480] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 728.590509] ? pcpu_alloc+0xc9/0x1190 [ 728.594321] ? __lockdep_init_map+0x100/0x5a0 [ 728.598830] mount_fs+0xa3/0x310 [ 728.602210] vfs_kern_mount.part.0+0x68/0x470 [ 728.606723] do_mount+0x115c/0x2f50 [ 728.610360] ? cmp_ex_sort+0xc0/0xc0 [ 728.614115] ? __do_page_fault+0x180/0xd60 [ 728.618361] ? copy_mount_string+0x40/0x40 [ 728.622614] ? memset+0x20/0x40 [ 728.625916] ? copy_mount_options+0x26f/0x380 [ 728.630435] ksys_mount+0xcf/0x130 [ 728.633991] __x64_sys_mount+0xba/0x150 [ 728.637974] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 728.642563] do_syscall_64+0xf9/0x620 [ 728.646382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.651578] RIP: 0033:0x7f996348801a [ 728.655301] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.674207] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 728.681942] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 728.689218] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 728.696495] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 728.703857] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 08:31:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c00007a000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) [ 728.711136] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 728.735016] BTRFS error (device loop2): open_ctree failed [ 728.750431] BTRFS error (device loop2): superblock checksum mismatch 08:31:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000000800000000000000f90dac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000005c0)) (fail_nth: 55) [ 728.787406] BTRFS error (device loop2): open_ctree failed 08:31:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 728.837556] BTRFS error (device loop2): superblock checksum mismatch 08:31:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000000010000ffffff8c000000000000002000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}], 0x0, &(0x7f00000005c0)) [ 728.908924] FAULT_INJECTION: forcing a failure. [ 728.908924] name failslab, interval 1, probability 0, space 0, times 0 [ 728.933379] CPU: 1 PID: 12072 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 728.941285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.950642] Call Trace: [ 728.953267] dump_stack+0x1fc/0x2ef [ 728.956937] should_fail.cold+0xa/0xf [ 728.960753] ? setup_fault_attr+0x200/0x200 [ 728.965085] ? lock_acquire+0x170/0x3c0 [ 728.969079] __should_failslab+0x115/0x180 [ 728.973322] should_failslab+0x5/0x10 [ 728.977134] kmem_cache_alloc_trace+0x284/0x380 [ 728.981819] btrfs_alloc_device+0xae/0x670 [ 728.986065] ? btrfs_finish_sprout+0x6c0/0x6c0 [ 728.990656] ? blkdev_put+0x85/0x520 [ 728.994382] close_fs_devices.part.0+0x263/0x8e0 [ 728.999157] btrfs_close_devices+0x95/0x1f0 [ 729.003497] btrfs_mount_root+0x10b9/0x1830 [ 729.007840] ? btrfs_decode_error+0x70/0x70 [ 729.012170] ? __mutex_unlock_slowpath+0xea/0x610 [ 729.017031] ? check_preemption_disabled+0x41/0x280 [ 729.022062] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 729.027086] ? pcpu_alloc+0xc9/0x1190 [ 729.030929] ? __lockdep_init_map+0x100/0x5a0 [ 729.035433] mount_fs+0xa3/0x310 [ 729.038812] vfs_kern_mount.part.0+0x68/0x470 [ 729.043316] ? kfree+0x110/0x210 [ 729.046683] vfs_kern_mount+0x3c/0x60 [ 729.050477] btrfs_mount+0x23a/0xaa0 [ 729.054181] ? btrfs_show_options+0xfd0/0xfd0 [ 729.058705] ? __mutex_unlock_slowpath+0xea/0x610 [ 729.063537] ? check_preemption_disabled+0x41/0x280 [ 729.068561] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 729.073582] ? pcpu_alloc+0xc9/0x1190 [ 729.077370] ? __lockdep_init_map+0x100/0x5a0 [ 729.081855] mount_fs+0xa3/0x310 [ 729.085227] vfs_kern_mount.part.0+0x68/0x470 [ 729.089720] do_mount+0x115c/0x2f50 [ 729.093336] ? cmp_ex_sort+0xc0/0xc0 [ 729.097035] ? __do_page_fault+0x180/0xd60 [ 729.101261] ? copy_mount_string+0x40/0x40 [ 729.105497] ? memset+0x20/0x40 [ 729.108777] ? copy_mount_options+0x26f/0x380 [ 729.113258] ksys_mount+0xcf/0x130 [ 729.116794] __x64_sys_mount+0xba/0x150 [ 729.120755] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 729.125325] do_syscall_64+0xf9/0x620 [ 729.129118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.134289] RIP: 0033:0x7f996348801a [ 729.137987] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.156888] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 729.164583] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 729.171837] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 729.179090] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 729.186431] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 729.193689] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 729.206312] ------------[ cut here ]------------ [ 729.211090] kernel BUG at fs/btrfs/volumes.c:1061! [ 729.217085] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 729.222463] CPU: 1 PID: 12072 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 729.230330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.239682] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 729.245219] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 729.264120] RSP: 0018:ffff88804a9d7838 EFLAGS: 00010246 [ 729.269476] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc90005c3a000 [ 729.276732] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 729.283987] RBP: ffff8880b1b43700 R08: 0000000000000000 R09: fffffffffffff000 [ 729.291243] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 729.298496] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff888096e9f6c0 [ 729.305753] FS: 00007f99609fc700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 729.313977] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 729.319844] CR2: 00007fb88c291fe8 CR3: 0000000046dff000 CR4: 00000000003406e0 [ 729.327106] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 729.334363] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 729.341623] Call Trace: [ 729.344209] btrfs_close_devices+0x95/0x1f0 [ 729.348526] btrfs_mount_root+0x10b9/0x1830 [ 729.352841] ? btrfs_decode_error+0x70/0x70 [ 729.357153] ? __mutex_unlock_slowpath+0xea/0x610 [ 729.361988] ? check_preemption_disabled+0x41/0x280 [ 729.366995] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 729.371998] ? pcpu_alloc+0xc9/0x1190 [ 729.375787] ? __lockdep_init_map+0x100/0x5a0 [ 729.380270] mount_fs+0xa3/0x310 [ 729.383630] vfs_kern_mount.part.0+0x68/0x470 [ 729.388117] ? kfree+0x110/0x210 [ 729.391473] vfs_kern_mount+0x3c/0x60 [ 729.395265] btrfs_mount+0x23a/0xaa0 [ 729.398968] ? btrfs_show_options+0xfd0/0xfd0 [ 729.403452] ? __mutex_unlock_slowpath+0xea/0x610 [ 729.408288] ? check_preemption_disabled+0x41/0x280 [ 729.413296] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 729.418300] ? pcpu_alloc+0xc9/0x1190 [ 729.422093] ? __lockdep_init_map+0x100/0x5a0 [ 729.426575] mount_fs+0xa3/0x310 [ 729.429932] vfs_kern_mount.part.0+0x68/0x470 [ 729.434594] do_mount+0x115c/0x2f50 [ 729.438238] ? cmp_ex_sort+0xc0/0xc0 [ 729.441947] ? __do_page_fault+0x180/0xd60 [ 729.446175] ? copy_mount_string+0x40/0x40 [ 729.450407] ? memset+0x20/0x40 [ 729.453687] ? copy_mount_options+0x26f/0x380 [ 729.458177] ksys_mount+0xcf/0x130 [ 729.461714] __x64_sys_mount+0xba/0x150 [ 729.465684] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 729.470369] do_syscall_64+0xf9/0x620 [ 729.474168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.479356] RIP: 0033:0x7f996348801a [ 729.483065] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.501955] RSP: 002b:00007f99609fbfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 729.509670] RAX: ffffffffffffffda RBX: 00000000200009c0 RCX: 00007f996348801a [ 729.517014] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f99609fc000 [ 729.524878] RBP: 00007f99609fc040 R08: 00007f99609fc040 R09: 0000000020000000 [ 729.532148] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 729.539406] R13: 0000000020000100 R14: 00007f99609fc000 R15: 00000000200005c0 [ 729.546665] Modules linked in: [ 729.554729] ---[ end trace 6dd0b5a66af22b03 ]--- 08:31:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000000cc0)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000005c0)={[{@noacl}]}) [ 729.559815] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 729.568922] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 729.590089] RSP: 0018:ffff88804a9d7838 EFLAGS: 00010246 [ 729.597523] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc90005c3a000 [ 729.605536] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 729.617872] RBP: ffff8880b1b43700 R08: 0000000000000000 R09: fffffffffffff000 [ 729.627588] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 729.635393] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff888096e9f6c0 [ 729.649056] FS: 00007f99609fc700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 729.657516] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 729.663525] CR2: 0000555556afc708 CR3: 0000000046dff000 CR4: 00000000003406e0 [ 729.670915] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 729.678246] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 729.697003] Kernel panic - not syncing: Fatal exception [ 729.702654] Kernel Offset: disabled [ 729.706385] Rebooting in 86400 seconds..